Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1 value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3 values | title stringlengths 1 844 | labels stringlengths 4 721 | body stringlengths 1 261k | index stringclasses 12 values | text_combine stringlengths 96 261k | label stringclasses 2 values | text stringlengths 96 248k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
205,223 | 15,964,725,111 | IssuesEvent | 2021-04-16 06:43:36 | nicoleang09/pe | https://api.github.com/repos/nicoleang09/pe | opened | Ordering of deliveries not stated in sections where delivery status is set | severity.Low type.DocumentationBug | As a user who jumped straight into the features section, I was very confused when I marked orders 1, 2 and 3 as delivered and they disappeared from view. This behaviour is not stated in the `delivered` feature section and can potentially be confusing for users.

<!--session: 1618552599099-89c22cef-a6eb-4194-9c2a-10e1e5147fea--> | 1.0 | Ordering of deliveries not stated in sections where delivery status is set - As a user who jumped straight into the features section, I was very confused when I marked orders 1, 2 and 3 as delivered and they disappeared from view. This behaviour is not stated in the `delivered` feature section and can potentially be confusing for users.

<!--session: 1618552599099-89c22cef-a6eb-4194-9c2a-10e1e5147fea--> | non_priority | ordering of deliveries not stated in sections where delivery status is set as a user who jumped straight into the features section i was very confused when i marked orders and as delivered and they disappeared from view this behaviour is not stated in the delivered feature section and can potentially be confusing for users | 0 |
46,449 | 19,189,154,426 | IssuesEvent | 2021-12-05 18:06:10 | AndreyPomelov/Telegram-bot | https://api.github.com/repos/AndreyPomelov/Telegram-bot | opened | Создать restapi для event-service | enhancement event-service | Данные передаются в формате json.
Единицей данных будет json объект "Событие" вида:
```
{
"id" : int,
"name": string,
"description" : string,
"link" : string,
"date_start" : datetime,
"date_end" : datetime,
"tags" : string
}
``` | 1.0 | Создать restapi для event-service - Данные передаются в формате json.
Единицей данных будет json объект "Событие" вида:
```
{
"id" : int,
"name": string,
"description" : string,
"link" : string,
"date_start" : datetime,
"date_end" : datetime,
"tags" : string
}
``` | non_priority | создать restapi для event service данные передаются в формате json единицей данных будет json объект событие вида id int name string description string link string date start datetime date end datetime tags string | 0 |
1,281 | 2,722,355,213 | IssuesEvent | 2015-04-14 02:44:11 | neovim/neovim | https://api.github.com/repos/neovim/neovim | closed | [RFC] / Master issue: Compiling under Windows (VS2013) | buildsystem compiler:msvc platform:windows | I'm (sort-of) interested in getting this working under VS2013, so I'd have a native-built neovim instead of relying on MinGW or similar (although this may be a valid goal as well)
I'd like to collate issues here that are stopping compilation of neovim on Windows on VS2013, in lieu of GitHub having proper blocker/issue dependency support
For now running `cmake -G Visual Studio 12` results in:
CMake Error at C:/Program Files (x86)/CMake 2.8/share/cmake-2.8/Modules/FindPackageHandleStandardArgs.cmake:108 (message):
Could NOT find LibUV (missing: LIBUV_LIBRARY LIBUV_INCLUDE_DIR)
Call Stack (most recent call first):
C:/Program Files (x86)/CMake 2.8/share/cmake-2.8/Modules /FindPackageHandleStandardArgs.cmake:315 (_FPHSA_FAILURE_MESSAGE)
cmake/FindLibUV.cmake:90 (find_package_handle_standard_args)
CMakeLists.txt:51 (find_package)
Todo:
- [x] Attempt to build neovim using cmake and VS2013
- [x] Build & install libuv somewhere that cmake can find it
- [ ] Port if_cscope to use libuv (https://github.com/neovim/neovim/pull/810#issuecomment-45277957)
- [x] start thinking about how to split platform code (os_unix.c os_msvc.c etc)
- [ ] Add bracket to if statements (maybe?)
- [ ] Start splitting compiler options in CMake
- [ ] Refactor vim_FulllName
- [ ] Add include guards: sys/time.h unistd.h
- [ ] Reorder includes here and there, i.e. ensure platform includes and/or vim.h are included before anything else
- [ ] Document the above
- [ ] ???
- [ ] Profit
Thanks to @equalsraf for the above
<bountysource-plugin>
---
Want to back this issue? **[Place a bounty on it!](https://www.bountysource.com/issues/2022535-rfc-master-issue-compiling-under-windows-vs2013?utm_campaign=plugin&utm_content=tracker%2F461131&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F461131&utm_medium=issues&utm_source=github).
</bountysource-plugin> | 1.0 | [RFC] / Master issue: Compiling under Windows (VS2013) - I'm (sort-of) interested in getting this working under VS2013, so I'd have a native-built neovim instead of relying on MinGW or similar (although this may be a valid goal as well)
I'd like to collate issues here that are stopping compilation of neovim on Windows on VS2013, in lieu of GitHub having proper blocker/issue dependency support
For now running `cmake -G Visual Studio 12` results in:
CMake Error at C:/Program Files (x86)/CMake 2.8/share/cmake-2.8/Modules/FindPackageHandleStandardArgs.cmake:108 (message):
Could NOT find LibUV (missing: LIBUV_LIBRARY LIBUV_INCLUDE_DIR)
Call Stack (most recent call first):
C:/Program Files (x86)/CMake 2.8/share/cmake-2.8/Modules /FindPackageHandleStandardArgs.cmake:315 (_FPHSA_FAILURE_MESSAGE)
cmake/FindLibUV.cmake:90 (find_package_handle_standard_args)
CMakeLists.txt:51 (find_package)
Todo:
- [x] Attempt to build neovim using cmake and VS2013
- [x] Build & install libuv somewhere that cmake can find it
- [ ] Port if_cscope to use libuv (https://github.com/neovim/neovim/pull/810#issuecomment-45277957)
- [x] start thinking about how to split platform code (os_unix.c os_msvc.c etc)
- [ ] Add bracket to if statements (maybe?)
- [ ] Start splitting compiler options in CMake
- [ ] Refactor vim_FulllName
- [ ] Add include guards: sys/time.h unistd.h
- [ ] Reorder includes here and there, i.e. ensure platform includes and/or vim.h are included before anything else
- [ ] Document the above
- [ ] ???
- [ ] Profit
Thanks to @equalsraf for the above
<bountysource-plugin>
---
Want to back this issue? **[Place a bounty on it!](https://www.bountysource.com/issues/2022535-rfc-master-issue-compiling-under-windows-vs2013?utm_campaign=plugin&utm_content=tracker%2F461131&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F461131&utm_medium=issues&utm_source=github).
</bountysource-plugin> | non_priority | master issue compiling under windows i m sort of interested in getting this working under so i d have a native built neovim instead of relying on mingw or similar although this may be a valid goal as well i d like to collate issues here that are stopping compilation of neovim on windows on in lieu of github having proper blocker issue dependency support for now running cmake g visual studio results in cmake error at c program files cmake share cmake modules findpackagehandlestandardargs cmake message could not find libuv missing libuv library libuv include dir call stack most recent call first c program files cmake share cmake modules findpackagehandlestandardargs cmake fphsa failure message cmake findlibuv cmake find package handle standard args cmakelists txt find package todo attempt to build neovim using cmake and build install libuv somewhere that cmake can find it port if cscope to use libuv start thinking about how to split platform code os unix c os msvc c etc add bracket to if statements maybe start splitting compiler options in cmake refactor vim fulllname add include guards sys time h unistd h reorder includes here and there i e ensure platform includes and or vim h are included before anything else document the above profit thanks to equalsraf for the above want to back this issue we accept bounties via | 0 |
69,540 | 8,419,284,293 | IssuesEvent | 2018-10-15 06:06:04 | monteirocamis/trocatexproject | https://api.github.com/repos/monteirocamis/trocatexproject | opened | Logo TrocaTex | UX/UI designer frontend help wanted photoshop | We need a logo for our project that shows change, movement , eco and modern stuff .
Insert your idea on _Imgs_ folder | 1.0 | Logo TrocaTex - We need a logo for our project that shows change, movement , eco and modern stuff .
Insert your idea on _Imgs_ folder | non_priority | logo trocatex we need a logo for our project that shows change movement eco and modern stuff insert your idea on imgs folder | 0 |
2,865 | 10,271,528,735 | IssuesEvent | 2019-08-23 16:19:34 | arcticicestudio/arctic | https://api.github.com/repos/arcticicestudio/arctic | opened | GitHub code owners | context-workflow scope-maintainability scope-quality scope-stability type-task | <p align="center"><img src="https://user-images.githubusercontent.com/7836623/63598769-85c23200-c5c0-11e9-967e-c8b3e5b43458.png" width="18%" /></p>
The project should adapt to GitHub's [code owners][intro] feature. This will allow to define matching pattern for project paths to automatically add all required reviewers of the core team and contributors to new PRs.
See [GitHub Help][help] for more details.
<p>
<figure>
<div align="center">
<img src="https://user-images.githubusercontent.com/7836623/63598793-91adf400-c5c0-11e9-99f8-2feaeaf57bd3.png" />
<figcaption>Sidebar for <em>code owner</em> PR review requests and review stats</figcaption>
</div>
</figure>
</p>
<p>
<figure>
<div align="center">
<img src="https://user-images.githubusercontent.com/7836623/63599279-8effce80-c5c1-11e9-9b87-1e1c276f7c6d.png" />
<figcaption>Branch protection configuration to enable required <em>code owner</em> review approvals</figcaption>
</div>
</figure>
</p>
<p>
<figure>
<div align="center">
<img src="https://user-images.githubusercontent.com/2513/27803610-544ba222-5ff8-11e7-9313-e4062315fb0c.png" />
<figcaption>PR status checks when required <em>code owner</em> review is pending</figcaption>
</div>
</figure>
</p>
[help]: https://help.github.com/articles/about-codeowners
[intro]: https://github.com/blog/2392-introducing-code-owners | True | GitHub code owners - <p align="center"><img src="https://user-images.githubusercontent.com/7836623/63598769-85c23200-c5c0-11e9-967e-c8b3e5b43458.png" width="18%" /></p>
The project should adapt to GitHub's [code owners][intro] feature. This will allow to define matching pattern for project paths to automatically add all required reviewers of the core team and contributors to new PRs.
See [GitHub Help][help] for more details.
<p>
<figure>
<div align="center">
<img src="https://user-images.githubusercontent.com/7836623/63598793-91adf400-c5c0-11e9-99f8-2feaeaf57bd3.png" />
<figcaption>Sidebar for <em>code owner</em> PR review requests and review stats</figcaption>
</div>
</figure>
</p>
<p>
<figure>
<div align="center">
<img src="https://user-images.githubusercontent.com/7836623/63599279-8effce80-c5c1-11e9-9b87-1e1c276f7c6d.png" />
<figcaption>Branch protection configuration to enable required <em>code owner</em> review approvals</figcaption>
</div>
</figure>
</p>
<p>
<figure>
<div align="center">
<img src="https://user-images.githubusercontent.com/2513/27803610-544ba222-5ff8-11e7-9313-e4062315fb0c.png" />
<figcaption>PR status checks when required <em>code owner</em> review is pending</figcaption>
</div>
</figure>
</p>
[help]: https://help.github.com/articles/about-codeowners
[intro]: https://github.com/blog/2392-introducing-code-owners | non_priority | github code owners the project should adapt to github s feature this will allow to define matching pattern for project paths to automatically add all required reviewers of the core team and contributors to new prs see for more details sidebar for code owner pr review requests and review stats branch protection configuration to enable required code owner review approvals pr status checks when required code owner review is pending | 0 |
410,310 | 27,779,249,657 | IssuesEvent | 2023-03-16 19:36:57 | mindsdb/mindsdb | https://api.github.com/repos/mindsdb/mindsdb | closed | [Docs] Update a link to the Apache Hive integration | help wanted good first issue documentation first-timers-only | ## Instructions :page_facing_up:
Here are the step-by-step instructions:
1. Go to the file `/mindsdb/README.md`.
2. Find the section titled `## Database Integrations`. This section contains a table with integrations and their logos.
3. Find the below HTML tag:
`<a href="https://docs.mindsdb.com/"><img src="https://img.shields.io/badge/Apache%20Hive-FDEE21?logo=apachehive&logoColor=000&style=for-the-badge" alt="Apache Hive Badge"></a>`
4. Update the `href` value to this link: https://docs.mindsdb.com/data-integrations/all-data-integrations#hive
5. Save the changes and create a PR.
## Hackathon Issue :loudspeaker:
MindsDB has organized a hackathon to let in more contributors to the in-database ML world.
Each hackathon issue is worth a certain amount of credits that will bring you prizes by the end of the MindsDB Hackathon.
Check out the [MindsDB Hackathon rules](https://mindsdb.com/mindsdb-hackathon)!
## The https://github.com/mindsdb/mindsdb/labels/first-timers-only Label
We are happy to welcome you on board! Please take a look at the rules below for first-time contributors.
1. You can solve only one issue labeled as https://github.com/mindsdb/mindsdb/labels/first-timers-only. After that, please look at other issues labeled as https://github.com/mindsdb/mindsdb/labels/good%20first%20issue, https://github.com/mindsdb/mindsdb/labels/help%20wanted, or https://github.com/mindsdb/mindsdb/labels/integration.
2. After you create your first PR in the MindsDB repository, please sign our CLA to become a MindsDB contributor. You can do that by leaving a comment that contains the following: `I have read the CLA Document and I hereby sign the CLA`
Thank you for contributing to MindsDB!
| 1.0 | [Docs] Update a link to the Apache Hive integration - ## Instructions :page_facing_up:
Here are the step-by-step instructions:
1. Go to the file `/mindsdb/README.md`.
2. Find the section titled `## Database Integrations`. This section contains a table with integrations and their logos.
3. Find the below HTML tag:
`<a href="https://docs.mindsdb.com/"><img src="https://img.shields.io/badge/Apache%20Hive-FDEE21?logo=apachehive&logoColor=000&style=for-the-badge" alt="Apache Hive Badge"></a>`
4. Update the `href` value to this link: https://docs.mindsdb.com/data-integrations/all-data-integrations#hive
5. Save the changes and create a PR.
## Hackathon Issue :loudspeaker:
MindsDB has organized a hackathon to let in more contributors to the in-database ML world.
Each hackathon issue is worth a certain amount of credits that will bring you prizes by the end of the MindsDB Hackathon.
Check out the [MindsDB Hackathon rules](https://mindsdb.com/mindsdb-hackathon)!
## The https://github.com/mindsdb/mindsdb/labels/first-timers-only Label
We are happy to welcome you on board! Please take a look at the rules below for first-time contributors.
1. You can solve only one issue labeled as https://github.com/mindsdb/mindsdb/labels/first-timers-only. After that, please look at other issues labeled as https://github.com/mindsdb/mindsdb/labels/good%20first%20issue, https://github.com/mindsdb/mindsdb/labels/help%20wanted, or https://github.com/mindsdb/mindsdb/labels/integration.
2. After you create your first PR in the MindsDB repository, please sign our CLA to become a MindsDB contributor. You can do that by leaving a comment that contains the following: `I have read the CLA Document and I hereby sign the CLA`
Thank you for contributing to MindsDB!
| non_priority | update a link to the apache hive integration instructions page facing up here are the step by step instructions go to the file mindsdb readme md find the section titled database integrations this section contains a table with integrations and their logos find the below html tag update the href value to this link save the changes and create a pr hackathon issue loudspeaker mindsdb has organized a hackathon to let in more contributors to the in database ml world each hackathon issue is worth a certain amount of credits that will bring you prizes by the end of the mindsdb hackathon check out the the label we are happy to welcome you on board please take a look at the rules below for first time contributors you can solve only one issue labeled as after that please look at other issues labeled as or after you create your first pr in the mindsdb repository please sign our cla to become a mindsdb contributor you can do that by leaving a comment that contains the following i have read the cla document and i hereby sign the cla thank you for contributing to mindsdb | 0 |
176,352 | 21,408,678,992 | IssuesEvent | 2022-04-22 01:40:32 | liaozan/houses_single | https://api.github.com/repos/liaozan/houses_single | closed | CVE-2016-10735 (Medium) detected in bootstrap-3.1.1.js, bootstrap-3.1.1.min.js | security vulnerability | ## CVE-2016-10735 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>bootstrap-3.1.1.js</b>, <b>bootstrap-3.1.1.min.js</b></p></summary>
<p>
<details><summary><b>bootstrap-3.1.1.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.1.1/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.1.1/js/bootstrap.js</a></p>
<p>Path to vulnerable library: /web/src/main/resources/static/static/assets/bootstrap/js/bootstrap.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.1.1.js** (Vulnerable Library)
</details>
<details><summary><b>bootstrap-3.1.1.min.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.1.1/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.1.1/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /web/src/main/resources/static/static/assets/bootstrap/js/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.1.1.min.js** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/liaozan/houses_single/commit/ba9621f72aed65c0e937586b8321d606047276ce">ba9621f72aed65c0e937586b8321d606047276ce</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
<p>Publish Date: 2019-01-09
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10735>CVE-2016-10735</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/twbs/bootstrap/issues/20184">https://github.com/twbs/bootstrap/issues/20184</a></p>
<p>Release Date: 2019-01-09</p>
<p>Fix Resolution: 3.4.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2016-10735 (Medium) detected in bootstrap-3.1.1.js, bootstrap-3.1.1.min.js - ## CVE-2016-10735 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>bootstrap-3.1.1.js</b>, <b>bootstrap-3.1.1.min.js</b></p></summary>
<p>
<details><summary><b>bootstrap-3.1.1.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.1.1/js/bootstrap.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.1.1/js/bootstrap.js</a></p>
<p>Path to vulnerable library: /web/src/main/resources/static/static/assets/bootstrap/js/bootstrap.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.1.1.js** (Vulnerable Library)
</details>
<details><summary><b>bootstrap-3.1.1.min.js</b></p></summary>
<p>The most popular front-end framework for developing responsive, mobile first projects on the web.</p>
<p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.1.1/js/bootstrap.min.js">https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.1.1/js/bootstrap.min.js</a></p>
<p>Path to vulnerable library: /web/src/main/resources/static/static/assets/bootstrap/js/bootstrap.min.js</p>
<p>
Dependency Hierarchy:
- :x: **bootstrap-3.1.1.min.js** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/liaozan/houses_single/commit/ba9621f72aed65c0e937586b8321d606047276ce">ba9621f72aed65c0e937586b8321d606047276ce</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
<p>Publish Date: 2019-01-09
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10735>CVE-2016-10735</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/twbs/bootstrap/issues/20184">https://github.com/twbs/bootstrap/issues/20184</a></p>
<p>Release Date: 2019-01-09</p>
<p>Fix Resolution: 3.4.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in bootstrap js bootstrap min js cve medium severity vulnerability vulnerable libraries bootstrap js bootstrap min js bootstrap js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library web src main resources static static assets bootstrap js bootstrap js dependency hierarchy x bootstrap js vulnerable library bootstrap min js the most popular front end framework for developing responsive mobile first projects on the web library home page a href path to vulnerable library web src main resources static static assets bootstrap js bootstrap min js dependency hierarchy x bootstrap min js vulnerable library found in head commit a href found in base branch master vulnerability details in bootstrap x before and x beta before beta xss is possible in the data target attribute a different vulnerability than cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
24,935 | 4,118,267,941 | IssuesEvent | 2016-06-08 10:45:23 | mathjax/MathJax | https://api.github.com/repos/mathjax/MathJax | closed | [Math Processing Error] when replacing msub by msup in an expression with nested mmultiscripts | Accepted Merged Test Needed | Hi, here a surprising result I just encountered today :
The only difference between (A) and (C) is I replaced msub by msup, the difference between (B) and (C) seems to be the mrow.
**(A) This works:**
```
<math>
<mmultiscripts>
<mmultiscripts>
<mi>A</mi>
<mi>B</mi>
<mprescripts />
<none />
<mi>D</mi>
</mmultiscripts>
<mrow>
<mo>(</mo>
<msub>
<mi>g</mi>
<mi>h</mi>
</msub>
<mo>)</mo>
</mrow>
<mprescripts />
<none />
<mi>i</mi>
</mmultiscripts>
</math>
```
**(B) This works :**
```
<math>
<mmultiscripts>
<mmultiscripts>
<mi>A</mi>
<mi>B</mi>
<mprescripts />
<none />
<mi>D</mi>
</mmultiscripts>
<msup>
<mi>g</mi>
<mi>h</mi>
</msup>
<mprescripts />
<none />
<mi>i</mi>
</mmultiscripts>
</math>
```
**(C) This yields [Math Processing Error] :**
```
<math>
<mmultiscripts>
<mmultiscripts>
<mi>A</mi>
<mi>B</mi>
<mprescripts />
<none />
<mi>D</mi>
</mmultiscripts>
<mrow>
<mo>(</mo>
<msup>
<mi>g</mi>
<mi>h</mi>
</msup>
<mo>)</mo>
</mrow>
<mprescripts />
<none />
<mi>i</mi>
</mmultiscripts>
</math>
```
| 1.0 | [Math Processing Error] when replacing msub by msup in an expression with nested mmultiscripts - Hi, here a surprising result I just encountered today :
The only difference between (A) and (C) is I replaced msub by msup, the difference between (B) and (C) seems to be the mrow.
**(A) This works:**
```
<math>
<mmultiscripts>
<mmultiscripts>
<mi>A</mi>
<mi>B</mi>
<mprescripts />
<none />
<mi>D</mi>
</mmultiscripts>
<mrow>
<mo>(</mo>
<msub>
<mi>g</mi>
<mi>h</mi>
</msub>
<mo>)</mo>
</mrow>
<mprescripts />
<none />
<mi>i</mi>
</mmultiscripts>
</math>
```
**(B) This works :**
```
<math>
<mmultiscripts>
<mmultiscripts>
<mi>A</mi>
<mi>B</mi>
<mprescripts />
<none />
<mi>D</mi>
</mmultiscripts>
<msup>
<mi>g</mi>
<mi>h</mi>
</msup>
<mprescripts />
<none />
<mi>i</mi>
</mmultiscripts>
</math>
```
**(C) This yields [Math Processing Error] :**
```
<math>
<mmultiscripts>
<mmultiscripts>
<mi>A</mi>
<mi>B</mi>
<mprescripts />
<none />
<mi>D</mi>
</mmultiscripts>
<mrow>
<mo>(</mo>
<msup>
<mi>g</mi>
<mi>h</mi>
</msup>
<mo>)</mo>
</mrow>
<mprescripts />
<none />
<mi>i</mi>
</mmultiscripts>
</math>
```
| non_priority | when replacing msub by msup in an expression with nested mmultiscripts hi here a surprising result i just encountered today the only difference between a and c is i replaced msub by msup the difference between b and c seems to be the mrow a this works a b d g h i b this works a b d g h i c this yields a b d g h i | 0 |
98,393 | 8,675,533,318 | IssuesEvent | 2018-11-30 11:10:27 | NativeScript/nativescript-cli | https://api.github.com/repos/NativeScript/nativescript-cli | closed | Don't prepare the project on preview command | ready for test | **Is your feature request related to a problem? Please describe.**
The project is prepared on preview command but actually no prepare is needed. This way the liveSync to preview app will be faster.
| 1.0 | Don't prepare the project on preview command - **Is your feature request related to a problem? Please describe.**
The project is prepared on preview command but actually no prepare is needed. This way the liveSync to preview app will be faster.
| non_priority | don t prepare the project on preview command is your feature request related to a problem please describe the project is prepared on preview command but actually no prepare is needed this way the livesync to preview app will be faster | 0 |
9,635 | 24,939,272,677 | IssuesEvent | 2022-10-31 17:30:47 | Azure/azure-sdk | https://api.github.com/repos/Azure/azure-sdk | closed | Board Review: Event Grid new system events | architecture board-review | ## Contacts and Timeline
* Responsible service team: DataBox, APIM
* Main contacts: @JoshLove-msft
* Expected code complete date: 11/4
* Expected release date: 11/7
## About the Service
* Link to the service REST APIs:
https://github.com/Azure/azure-rest-api-specs/pull/21157
https://github.com/Azure/azure-rest-api-specs/pull/20871
## Artifacts required (per language)
### .NET
* APIView Link: To be added
### Java
* APIView Link: To be added
### Python
* APIView Link: N/A
### TypeScript
* APIView Link: To be added
For all other languages, send a request to the Architecture Board to discuss the best format on individual basis.
## Thank you!
| 1.0 | Board Review: Event Grid new system events - ## Contacts and Timeline
* Responsible service team: DataBox, APIM
* Main contacts: @JoshLove-msft
* Expected code complete date: 11/4
* Expected release date: 11/7
## About the Service
* Link to the service REST APIs:
https://github.com/Azure/azure-rest-api-specs/pull/21157
https://github.com/Azure/azure-rest-api-specs/pull/20871
## Artifacts required (per language)
### .NET
* APIView Link: To be added
### Java
* APIView Link: To be added
### Python
* APIView Link: N/A
### TypeScript
* APIView Link: To be added
For all other languages, send a request to the Architecture Board to discuss the best format on individual basis.
## Thank you!
| non_priority | board review event grid new system events contacts and timeline responsible service team databox apim main contacts joshlove msft expected code complete date expected release date about the service link to the service rest apis artifacts required per language net apiview link to be added java apiview link to be added python apiview link n a typescript apiview link to be added for all other languages send a request to the architecture board to discuss the best format on individual basis thank you | 0 |
359,873 | 25,259,614,612 | IssuesEvent | 2022-11-15 21:24:59 | bUnit-dev/bUnit | https://api.github.com/repos/bUnit-dev/bUnit | closed | Investigate QuickGrid in .NET7 | documentation | With the ASP.NET Core 7 Preview 6 announcements they also introduced QuickGrid as an external package. Even though this is not a first class citizen directly inside aspnet chances are lots of people will use it as a lightweight alternative to full blown grids.
Currently it is flagged experimental. We should have an eye on that and make it was to setup in bUnit if it needs further setup.
Article: https://aspnet.github.io/quickgridsamples/ | 1.0 | Investigate QuickGrid in .NET7 - With the ASP.NET Core 7 Preview 6 announcements they also introduced QuickGrid as an external package. Even though this is not a first class citizen directly inside aspnet chances are lots of people will use it as a lightweight alternative to full blown grids.
Currently it is flagged experimental. We should have an eye on that and make it was to setup in bUnit if it needs further setup.
Article: https://aspnet.github.io/quickgridsamples/ | non_priority | investigate quickgrid in with the asp net core preview announcements they also introduced quickgrid as an external package even though this is not a first class citizen directly inside aspnet chances are lots of people will use it as a lightweight alternative to full blown grids currently it is flagged experimental we should have an eye on that and make it was to setup in bunit if it needs further setup article | 0 |
166,513 | 12,960,091,102 | IssuesEvent | 2020-07-20 13:54:43 | FreeRDP/FreeRDP | https://api.github.com/repos/FreeRDP/FreeRDP | closed | Backport Use CMake to detect availability of getlogin_r | backport-to-stable fixed-waiting-test | Releated pull request for master:
#6317 | 1.0 | Backport Use CMake to detect availability of getlogin_r - Releated pull request for master:
#6317 | non_priority | backport use cmake to detect availability of getlogin r releated pull request for master | 0 |
122,630 | 12,156,714,029 | IssuesEvent | 2020-04-25 18:31:54 | webpack/webpack | https://api.github.com/repos/webpack/webpack | closed | Create Outreach Communities | documentation inactive | Successfully we were able to help start and perpetuate a community for China for webpack. It's been extremely successful and we continue to see their traffic as 2nd to USA in docs, and repo page visitors.
However [it came to our attention on twitter](https://twitter.com/truth2_truth/status/848567713798791169) that we could maybe be doing more. I'm all for equality as access to opportunity, and furthermore since all of us have little to no bandwidth, we'd want to find a group of developers/advocates who are willing to lead the initiative. First step would simply be to create the guidelines for how one would approach this outreach.
https://twitter.com/truth2_truth/status/848567713798791169 <== this twitter account nominated themselves to write this guideline, or seems to have experience in it. | 1.0 | Create Outreach Communities - Successfully we were able to help start and perpetuate a community for China for webpack. It's been extremely successful and we continue to see their traffic as 2nd to USA in docs, and repo page visitors.
However [it came to our attention on twitter](https://twitter.com/truth2_truth/status/848567713798791169) that we could maybe be doing more. I'm all for equality as access to opportunity, and furthermore since all of us have little to no bandwidth, we'd want to find a group of developers/advocates who are willing to lead the initiative. First step would simply be to create the guidelines for how one would approach this outreach.
https://twitter.com/truth2_truth/status/848567713798791169 <== this twitter account nominated themselves to write this guideline, or seems to have experience in it. | non_priority | create outreach communities successfully we were able to help start and perpetuate a community for china for webpack it s been extremely successful and we continue to see their traffic as to usa in docs and repo page visitors however that we could maybe be doing more i m all for equality as access to opportunity and furthermore since all of us have little to no bandwidth we d want to find a group of developers advocates who are willing to lead the initiative first step would simply be to create the guidelines for how one would approach this outreach this twitter account nominated themselves to write this guideline or seems to have experience in it | 0 |
78,128 | 10,040,842,708 | IssuesEvent | 2019-07-18 20:59:43 | Jerald/yolol-is-cylons | https://api.github.com/repos/Jerald/yolol-is-cylons | opened | Write getting started guide for YOLOL | documentation | - Should provide a "hello world"-like introduction to the language
- Should build a program by introducing and explaining new features
- Doesn't need to include every feature in YOLOL
- Should include: local vars, data fields, if statements, gotos, basic operators
- Should be written for a non-technical audience
- Should act as a companion document for #28
I'm willing to work on this. Any help or contributions would be appreciated. | 1.0 | Write getting started guide for YOLOL - - Should provide a "hello world"-like introduction to the language
- Should build a program by introducing and explaining new features
- Doesn't need to include every feature in YOLOL
- Should include: local vars, data fields, if statements, gotos, basic operators
- Should be written for a non-technical audience
- Should act as a companion document for #28
I'm willing to work on this. Any help or contributions would be appreciated. | non_priority | write getting started guide for yolol should provide a hello world like introduction to the language should build a program by introducing and explaining new features doesn t need to include every feature in yolol should include local vars data fields if statements gotos basic operators should be written for a non technical audience should act as a companion document for i m willing to work on this any help or contributions would be appreciated | 0 |
49,617 | 13,454,886,939 | IssuesEvent | 2020-09-09 04:54:19 | Techini/vulnado | https://api.github.com/repos/Techini/vulnado | opened | CVE-2019-14893 (High) detected in jackson-databind-2.9.8.jar | security vulnerability | ## CVE-2019-14893 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /tmp/ws-scm/vulnado/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- jjwt-jackson-0.11.2.jar (Root Library)
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Techini/vulnado/commit/4fb542733bde6ab3a1680292943de904d0621c33">4fb542733bde6ab3a1680292943de904d0621c33</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893>CVE-2019-14893</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2019-14893 (High) detected in jackson-databind-2.9.8.jar - ## CVE-2019-14893 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /tmp/ws-scm/vulnado/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- jjwt-jackson-0.11.2.jar (Root Library)
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Techini/vulnado/commit/4fb542733bde6ab3a1680292943de904d0621c33">4fb542733bde6ab3a1680292943de904d0621c33</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893>CVE-2019-14893</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file tmp ws scm vulnado pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy jjwt jackson jar root library x jackson databind jar vulnerable library found in head commit a href vulnerability details a flaw was discovered in fasterxml jackson databind in all versions before and where it would permit polymorphic deserialization of malicious objects using the xalan jndi gadget when used in conjunction with polymorphic type handling methods such as enabledefaulttyping or when jsontypeinfo is using id class or id minimal class or in any other way which objectmapper readvalue might instantiate objects from unsafe sources an attacker could use this flaw to execute arbitrary code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource | 0 |
233,773 | 19,058,939,278 | IssuesEvent | 2021-11-26 03:13:51 | askoufis/vocab-vscode-extension | https://api.github.com/repos/askoufis/vocab-vscode-extension | closed | No unit tests | testing | There are a few simple functions that could do with some unit tests, just for sanity's sake. | 1.0 | No unit tests - There are a few simple functions that could do with some unit tests, just for sanity's sake. | non_priority | no unit tests there are a few simple functions that could do with some unit tests just for sanity s sake | 0 |
96,583 | 8,617,669,320 | IssuesEvent | 2018-11-20 06:44:49 | humera987/FXLabs-Test-Automation | https://api.github.com/repos/humera987/FXLabs-Test-Automation | closed | projecttesting20 : ApiV1IssueTrackersSkillTypeTypeGetQueryParamPagesizeNegativeNumber | projecttesting20 | Project : projecttesting20
Job : uat 1
Env : uat
Region : US_WEST
Result : fail
Status Code : 404
Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=ODkyMTdmOTktYmQ2Yy00OWQ1LTk3NzktODk5Njg4ZjMyOTA2; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Tue, 20 Nov 2018 06:20:00 GMT]}
Endpoint : http://13.56.210.25/api/v1/api/v1/issue-trackers/skill-type/cInFBrdp?pageSize=-1
Request :
Response :
{
"timestamp" : "2018-11-20T06:20:00.454+0000",
"status" : 404,
"error" : "Not Found",
"message" : "No message available",
"path" : "/api/v1/api/v1/issue-trackers/skill-type/cInFBrdp"
}
Logs :
Assertion [@StatusCode != 401] resolved-to [404 != 401] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed]
--- FX Bot --- | 1.0 | projecttesting20 : ApiV1IssueTrackersSkillTypeTypeGetQueryParamPagesizeNegativeNumber - Project : projecttesting20
Job : uat 1
Env : uat
Region : US_WEST
Result : fail
Status Code : 404
Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Set-Cookie=[SESSION=ODkyMTdmOTktYmQ2Yy00OWQ1LTk3NzktODk5Njg4ZjMyOTA2; Path=/; HttpOnly], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Tue, 20 Nov 2018 06:20:00 GMT]}
Endpoint : http://13.56.210.25/api/v1/api/v1/issue-trackers/skill-type/cInFBrdp?pageSize=-1
Request :
Response :
{
"timestamp" : "2018-11-20T06:20:00.454+0000",
"status" : 404,
"error" : "Not Found",
"message" : "No message available",
"path" : "/api/v1/api/v1/issue-trackers/skill-type/cInFBrdp"
}
Logs :
Assertion [@StatusCode != 401] resolved-to [404 != 401] result [Passed]Assertion [@StatusCode != 404] resolved-to [404 != 404] result [Failed]
--- FX Bot --- | non_priority | project job uat env uat region us west result fail status code headers x content type options x xss protection cache control pragma expires x frame options set cookie content type transfer encoding date endpoint request response timestamp status error not found message no message available path api api issue trackers skill type cinfbrdp logs assertion resolved to result assertion resolved to result fx bot | 0 |
52,871 | 6,284,460,694 | IssuesEvent | 2017-07-19 07:50:23 | manchesergit/material-ui | https://api.github.com/repos/manchesergit/material-ui | opened | Test Avatar ID generation | unit testing | Tests need to be added to prove that Avatar
[ ] produces a unique ID for itself if none is given
[ ] uses the ID given in the properties | 1.0 | Test Avatar ID generation - Tests need to be added to prove that Avatar
[ ] produces a unique ID for itself if none is given
[ ] uses the ID given in the properties | non_priority | test avatar id generation tests need to be added to prove that avatar produces a unique id for itself if none is given uses the id given in the properties | 0 |
64,034 | 8,706,838,979 | IssuesEvent | 2018-12-06 04:58:55 | BrowseHandsfree/handsfreeJS | https://api.github.com/repos/BrowseHandsfree/handsfreeJS | closed | Settings API | ✨ enhancement 📖 Documentation 🔌 Plugin | Let's add in a settings API, which will allow people to run Handsfree.js on low-powered devices (or take advantage of beefier ones). This will also enable multi-tracking support and more
**Settings Route**
- [x] Create a `/settings` route. This route will be reused at browsehandsfree.com
- [x] Add FPS checker for benchmarking settings
- [x] Configure settings on instantiation with `new Handsfree({settings: {}})`
- ~~Create a Dat.gui plugin to be used in Glitches and forked projects~~
- ~~Unit test~~
Edit: We'll do this in another story
**Settings:**
- [x] Mouse sensitivity
- [x] Click sensitivity
- [x] setNumFacesToTrack | 1.0 | Settings API - Let's add in a settings API, which will allow people to run Handsfree.js on low-powered devices (or take advantage of beefier ones). This will also enable multi-tracking support and more
**Settings Route**
- [x] Create a `/settings` route. This route will be reused at browsehandsfree.com
- [x] Add FPS checker for benchmarking settings
- [x] Configure settings on instantiation with `new Handsfree({settings: {}})`
- ~~Create a Dat.gui plugin to be used in Glitches and forked projects~~
- ~~Unit test~~
Edit: We'll do this in another story
**Settings:**
- [x] Mouse sensitivity
- [x] Click sensitivity
- [x] setNumFacesToTrack | non_priority | settings api let s add in a settings api which will allow people to run handsfree js on low powered devices or take advantage of beefier ones this will also enable multi tracking support and more settings route create a settings route this route will be reused at browsehandsfree com add fps checker for benchmarking settings configure settings on instantiation with new handsfree settings create a dat gui plugin to be used in glitches and forked projects unit test edit we ll do this in another story settings mouse sensitivity click sensitivity setnumfacestotrack | 0 |
22,145 | 11,494,905,042 | IssuesEvent | 2020-02-12 03:04:07 | melanchall/drywetmidi | https://api.github.com/repos/melanchall/drywetmidi | closed | Parsing performance | performance | I seem to be getting slow results when parsing.
Midi file with 14,000 events:
`GetTempoMap() = 140-270ms `
`GetNotes() = 200-300ms`
`GetTimedEvents() + TimeAs() = 180-322ms`
```
foreach (TimedEvent e in midi.GetTimedEvents())
{
realtime = e.TimeAs<MetricTimeSpan>(tempoMap).TotalMicroseconds / 1000000f
}
```
Running on Unity + i7 3770.
Any thoughts?
midi file:
[midi.zip](https://github.com/melanchall/drywetmidi/files/4070374/midi.zip)
| True | Parsing performance - I seem to be getting slow results when parsing.
Midi file with 14,000 events:
`GetTempoMap() = 140-270ms `
`GetNotes() = 200-300ms`
`GetTimedEvents() + TimeAs() = 180-322ms`
```
foreach (TimedEvent e in midi.GetTimedEvents())
{
realtime = e.TimeAs<MetricTimeSpan>(tempoMap).TotalMicroseconds / 1000000f
}
```
Running on Unity + i7 3770.
Any thoughts?
midi file:
[midi.zip](https://github.com/melanchall/drywetmidi/files/4070374/midi.zip)
| non_priority | parsing performance i seem to be getting slow results when parsing midi file with events gettempomap getnotes gettimedevents timeas foreach timedevent e in midi gettimedevents realtime e timeas tempomap totalmicroseconds running on unity any thoughts midi file | 0 |
32,281 | 12,102,277,258 | IssuesEvent | 2020-04-20 16:26:23 | Hyraze/infinite | https://api.github.com/repos/Hyraze/infinite | opened | WS-2019-0063 (High) detected in js-yaml-3.7.0.tgz, js-yaml-3.12.1.tgz | security vulnerability | ## WS-2019-0063 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>js-yaml-3.7.0.tgz</b>, <b>js-yaml-3.12.1.tgz</b></p></summary>
<p>
<details><summary><b>js-yaml-3.7.0.tgz</b></p></summary>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.7.0.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.7.0.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/infinite/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/infinite/node_modules/htmlnano/node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- parcel-bundler-1.11.0.tgz (Root Library)
- htmlnano-0.1.10.tgz
- cssnano-3.10.0.tgz
- postcss-svgo-2.1.6.tgz
- svgo-0.7.2.tgz
- :x: **js-yaml-3.7.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>js-yaml-3.12.1.tgz</b></p></summary>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.12.1.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.12.1.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/infinite/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/infinite/node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- parcel-bundler-1.11.0.tgz (Root Library)
- :x: **js-yaml-3.12.1.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://api.github.com/repos/Hyraze/infinite/commits/f686a0f9119ce1b31715bd19e5a2f4705af80098">f686a0f9119ce1b31715bd19e5a2f4705af80098</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.
<p>Publish Date: 2019-04-30
<p>URL: <a href=https://github.com/nodeca/js-yaml/pull/480>WS-2019-0063</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a></p>
<p>Release Date: 2019-04-30</p>
<p>Fix Resolution: 3.13.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2019-0063 (High) detected in js-yaml-3.7.0.tgz, js-yaml-3.12.1.tgz - ## WS-2019-0063 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>js-yaml-3.7.0.tgz</b>, <b>js-yaml-3.12.1.tgz</b></p></summary>
<p>
<details><summary><b>js-yaml-3.7.0.tgz</b></p></summary>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.7.0.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.7.0.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/infinite/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/infinite/node_modules/htmlnano/node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- parcel-bundler-1.11.0.tgz (Root Library)
- htmlnano-0.1.10.tgz
- cssnano-3.10.0.tgz
- postcss-svgo-2.1.6.tgz
- svgo-0.7.2.tgz
- :x: **js-yaml-3.7.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>js-yaml-3.12.1.tgz</b></p></summary>
<p>YAML 1.2 parser and serializer</p>
<p>Library home page: <a href="https://registry.npmjs.org/js-yaml/-/js-yaml-3.12.1.tgz">https://registry.npmjs.org/js-yaml/-/js-yaml-3.12.1.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/infinite/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/infinite/node_modules/js-yaml/package.json</p>
<p>
Dependency Hierarchy:
- parcel-bundler-1.11.0.tgz (Root Library)
- :x: **js-yaml-3.12.1.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://api.github.com/repos/Hyraze/infinite/commits/f686a0f9119ce1b31715bd19e5a2f4705af80098">f686a0f9119ce1b31715bd19e5a2f4705af80098</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Js-yaml prior to 3.13.1 are vulnerable to Code Injection. The load() function may execute arbitrary code injected through a malicious YAML file.
<p>Publish Date: 2019-04-30
<p>URL: <a href=https://github.com/nodeca/js-yaml/pull/480>WS-2019-0063</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/813">https://www.npmjs.com/advisories/813</a></p>
<p>Release Date: 2019-04-30</p>
<p>Fix Resolution: 3.13.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | ws high detected in js yaml tgz js yaml tgz ws high severity vulnerability vulnerable libraries js yaml tgz js yaml tgz js yaml tgz yaml parser and serializer library home page a href path to dependency file tmp ws scm infinite package json path to vulnerable library tmp ws scm infinite node modules htmlnano node modules js yaml package json dependency hierarchy parcel bundler tgz root library htmlnano tgz cssnano tgz postcss svgo tgz svgo tgz x js yaml tgz vulnerable library js yaml tgz yaml parser and serializer library home page a href path to dependency file tmp ws scm infinite package json path to vulnerable library tmp ws scm infinite node modules js yaml package json dependency hierarchy parcel bundler tgz root library x js yaml tgz vulnerable library found in head commit a href vulnerability details js yaml prior to are vulnerable to code injection the load function may execute arbitrary code injected through a malicious yaml file publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
310,914 | 26,753,718,910 | IssuesEvent | 2023-01-30 21:53:00 | elastic/kibana | https://api.github.com/repos/elastic/kibana | opened | Failing test: Plugin Functional Tests.test/plugin_functional/test_suites/saved_objects_management/visible_in_management·ts - Saved Objects Management types with `visibleInManagement` "before all" hook in "types with `visibleInManagement` " | failed-test | A test failed on a tracked branch
```
Error: Forcing mocha to abort
at Object.next (node_modules/@kbn/test/target_node/functional_test_runner/lib/mocha/run_tests.js:42:25)
at SafeSubscriber.__tryOrUnsub (node_modules/rxjs/src/internal/Subscriber.ts:265:10)
at SafeSubscriber.next (node_modules/rxjs/src/internal/Subscriber.ts:207:14)
at Subscriber._next (node_modules/rxjs/src/internal/Subscriber.ts:139:22)
at Subscriber.next (node_modules/rxjs/src/internal/Subscriber.ts:99:12)
at RaceSubscriber.notifyNext (node_modules/rxjs/src/internal/observable/race.ts:137:22)
at InnerSubscriber._next (node_modules/rxjs/src/internal/InnerSubscriber.ts:17:17)
at InnerSubscriber.Subscriber.next (node_modules/rxjs/src/internal/Subscriber.ts:99:12)
at TakeSubscriber._next (node_modules/rxjs/src/internal/operators/take.ts:92:24)
at TakeSubscriber.Subscriber.next (node_modules/rxjs/src/internal/Subscriber.ts:99:12)
at AbortSignal.handler (node_modules/rxjs/src/internal/observable/fromEvent.ts:201:20)
at AbortSignal.[nodejs.internal.kHybridDispatch] (node:internal/event_target:736:20)
at AbortSignal.dispatchEvent (node:internal/event_target:678:26)
at abortSignal (node:internal/abort_controller:292:10)
at AbortController.abort (node:internal/abort_controller:323:5)
at onEarlyExit (node_modules/@kbn/test/target_node/functional_tests/tasks.js:112:21) {
uncaught: true
}
```
First failure: [CI Build - 7.17](https://buildkite.com/elastic/kibana-on-merge/builds/26206#0186047c-8d8f-4ee6-a1b5-626689996e48)
<!-- kibanaCiData = {"failed-test":{"test.class":"Plugin Functional Tests.test/plugin_functional/test_suites/saved_objects_management/visible_in_management·ts","test.name":"Saved Objects Management types with `visibleInManagement` \"before all\" hook in \"types with `visibleInManagement` \"","test.failCount":1}} --> | 1.0 | Failing test: Plugin Functional Tests.test/plugin_functional/test_suites/saved_objects_management/visible_in_management·ts - Saved Objects Management types with `visibleInManagement` "before all" hook in "types with `visibleInManagement` " - A test failed on a tracked branch
```
Error: Forcing mocha to abort
at Object.next (node_modules/@kbn/test/target_node/functional_test_runner/lib/mocha/run_tests.js:42:25)
at SafeSubscriber.__tryOrUnsub (node_modules/rxjs/src/internal/Subscriber.ts:265:10)
at SafeSubscriber.next (node_modules/rxjs/src/internal/Subscriber.ts:207:14)
at Subscriber._next (node_modules/rxjs/src/internal/Subscriber.ts:139:22)
at Subscriber.next (node_modules/rxjs/src/internal/Subscriber.ts:99:12)
at RaceSubscriber.notifyNext (node_modules/rxjs/src/internal/observable/race.ts:137:22)
at InnerSubscriber._next (node_modules/rxjs/src/internal/InnerSubscriber.ts:17:17)
at InnerSubscriber.Subscriber.next (node_modules/rxjs/src/internal/Subscriber.ts:99:12)
at TakeSubscriber._next (node_modules/rxjs/src/internal/operators/take.ts:92:24)
at TakeSubscriber.Subscriber.next (node_modules/rxjs/src/internal/Subscriber.ts:99:12)
at AbortSignal.handler (node_modules/rxjs/src/internal/observable/fromEvent.ts:201:20)
at AbortSignal.[nodejs.internal.kHybridDispatch] (node:internal/event_target:736:20)
at AbortSignal.dispatchEvent (node:internal/event_target:678:26)
at abortSignal (node:internal/abort_controller:292:10)
at AbortController.abort (node:internal/abort_controller:323:5)
at onEarlyExit (node_modules/@kbn/test/target_node/functional_tests/tasks.js:112:21) {
uncaught: true
}
```
First failure: [CI Build - 7.17](https://buildkite.com/elastic/kibana-on-merge/builds/26206#0186047c-8d8f-4ee6-a1b5-626689996e48)
<!-- kibanaCiData = {"failed-test":{"test.class":"Plugin Functional Tests.test/plugin_functional/test_suites/saved_objects_management/visible_in_management·ts","test.name":"Saved Objects Management types with `visibleInManagement` \"before all\" hook in \"types with `visibleInManagement` \"","test.failCount":1}} --> | non_priority | failing test plugin functional tests test plugin functional test suites saved objects management visible in management·ts saved objects management types with visibleinmanagement before all hook in types with visibleinmanagement a test failed on a tracked branch error forcing mocha to abort at object next node modules kbn test target node functional test runner lib mocha run tests js at safesubscriber tryorunsub node modules rxjs src internal subscriber ts at safesubscriber next node modules rxjs src internal subscriber ts at subscriber next node modules rxjs src internal subscriber ts at subscriber next node modules rxjs src internal subscriber ts at racesubscriber notifynext node modules rxjs src internal observable race ts at innersubscriber next node modules rxjs src internal innersubscriber ts at innersubscriber subscriber next node modules rxjs src internal subscriber ts at takesubscriber next node modules rxjs src internal operators take ts at takesubscriber subscriber next node modules rxjs src internal subscriber ts at abortsignal handler node modules rxjs src internal observable fromevent ts at abortsignal node internal event target at abortsignal dispatchevent node internal event target at abortsignal node internal abort controller at abortcontroller abort node internal abort controller at onearlyexit node modules kbn test target node functional tests tasks js uncaught true first failure | 0 |
41,102 | 6,891,241,217 | IssuesEvent | 2017-11-22 16:26:09 | rkt/rkt | https://api.github.com/repos/rkt/rkt | closed | run/volume: please document recursive=<bool> flag | area/usability component/stage0 kind/documentation low hanging fruit | We run `rkt` on a host with a lot of automount points (1000 or so). When using stage1-coreos, we could simply mount the parent directory into a pod, and have the automounter on the host resolve requests from the pod. This was great.
Having switched to stage1-fly (because of #3639), we see that submounts of parent mounted on the host are not visible in the pod. Which is, for us, a showstopper.
Is there a work-around? (Otherwise we'll have to abandon our use of stage1-fly, and revert to work-arounds for #3639.)
**Environment**
```
rkt Version: 1.26.0
appc Version: 0.8.10
Go Version: go1.7.4
Go OS/Arch: linux/amd64
Features: -TPM +SDJOURNAL
--
Linux 4.4.65-1.el7.elrepo.x86_64 x86_64
--
NAME="CentOS Linux"
VERSION="7 (Core)"
ID="centos"
ID_LIKE="rhel fedora"
VERSION_ID="7"
PRETTY_NAME="CentOS Linux 7 (Core)"
ANSI_COLOR="0;31"
CPE_NAME="cpe:/o:centos:centos:7"
HOME_URL="https://www.centos.org/"
BUG_REPORT_URL="https://bugs.centos.org/"
CENTOS_MANTISBT_PROJECT="CentOS-7"
CENTOS_MANTISBT_PROJECT_VERSION="7"
REDHAT_SUPPORT_PRODUCT="centos"
REDHAT_SUPPORT_PRODUCT_VERSION="7"
--
systemd 219
+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ -LZ4 -SECCOMP +BLKID +ELFUTILS +KMOD +IDN
```
**What did you do?**
Note automounter has already mounted required directory on host:
```
inscrutable# df | grep bioinformatics_dev
ignition:/z201/active/bioinformatics_dev 1485973504 15675392 1470298112 2% /bifo/active/bioinformatics_dev
```
Example with default coreos stage1, works fine:
```
inscrutable# /usr/bin/rkt --insecure-options=image run --volume bifo,kind=host,source=/bifo quay.io/coreos/alpine-sh --mount volume=bifo,target=/bifo --exec /bin/sh -- -c 'ls /bifo/active/bioinformatics_dev'
[3702827.331161] alpine-sh[5]: BBMap
[3702827.331441] alpine-sh[5]: BGPA
[3702827.331659] alpine-sh[5]: Boost
[3702827.331879] alpine-sh[5]: GBSX
inscrutable#
```
Example with fly stage1, doesn't see submount:
```
inscrutable# /usr/bin/rkt --insecure-options=image run --volume bifo,kind=host,source=/bifo quay.io/coreos/alpine-sh --mount volume=bifo,target=/bifo --stage1-name=coreos.com/rkt/stage1-fly:1.26.0 --exec /bin/sh -- -c 'ls /bifo/active/bioinformatics_dev'
ls: /bifo/active/bioinformatics_dev: No such file or directory
```
**What did you expect to see?**
Similar output from fly stage1 as for default coreos stage1
**What did you see instead?**
Failed to access mounted subdirectory.
Is there a way to get stage1-fly to see these submounts? | 1.0 | run/volume: please document recursive=<bool> flag - We run `rkt` on a host with a lot of automount points (1000 or so). When using stage1-coreos, we could simply mount the parent directory into a pod, and have the automounter on the host resolve requests from the pod. This was great.
Having switched to stage1-fly (because of #3639), we see that submounts of parent mounted on the host are not visible in the pod. Which is, for us, a showstopper.
Is there a work-around? (Otherwise we'll have to abandon our use of stage1-fly, and revert to work-arounds for #3639.)
**Environment**
```
rkt Version: 1.26.0
appc Version: 0.8.10
Go Version: go1.7.4
Go OS/Arch: linux/amd64
Features: -TPM +SDJOURNAL
--
Linux 4.4.65-1.el7.elrepo.x86_64 x86_64
--
NAME="CentOS Linux"
VERSION="7 (Core)"
ID="centos"
ID_LIKE="rhel fedora"
VERSION_ID="7"
PRETTY_NAME="CentOS Linux 7 (Core)"
ANSI_COLOR="0;31"
CPE_NAME="cpe:/o:centos:centos:7"
HOME_URL="https://www.centos.org/"
BUG_REPORT_URL="https://bugs.centos.org/"
CENTOS_MANTISBT_PROJECT="CentOS-7"
CENTOS_MANTISBT_PROJECT_VERSION="7"
REDHAT_SUPPORT_PRODUCT="centos"
REDHAT_SUPPORT_PRODUCT_VERSION="7"
--
systemd 219
+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ -LZ4 -SECCOMP +BLKID +ELFUTILS +KMOD +IDN
```
**What did you do?**
Note automounter has already mounted required directory on host:
```
inscrutable# df | grep bioinformatics_dev
ignition:/z201/active/bioinformatics_dev 1485973504 15675392 1470298112 2% /bifo/active/bioinformatics_dev
```
Example with default coreos stage1, works fine:
```
inscrutable# /usr/bin/rkt --insecure-options=image run --volume bifo,kind=host,source=/bifo quay.io/coreos/alpine-sh --mount volume=bifo,target=/bifo --exec /bin/sh -- -c 'ls /bifo/active/bioinformatics_dev'
[3702827.331161] alpine-sh[5]: BBMap
[3702827.331441] alpine-sh[5]: BGPA
[3702827.331659] alpine-sh[5]: Boost
[3702827.331879] alpine-sh[5]: GBSX
inscrutable#
```
Example with fly stage1, doesn't see submount:
```
inscrutable# /usr/bin/rkt --insecure-options=image run --volume bifo,kind=host,source=/bifo quay.io/coreos/alpine-sh --mount volume=bifo,target=/bifo --stage1-name=coreos.com/rkt/stage1-fly:1.26.0 --exec /bin/sh -- -c 'ls /bifo/active/bioinformatics_dev'
ls: /bifo/active/bioinformatics_dev: No such file or directory
```
**What did you expect to see?**
Similar output from fly stage1 as for default coreos stage1
**What did you see instead?**
Failed to access mounted subdirectory.
Is there a way to get stage1-fly to see these submounts? | non_priority | run volume please document recursive flag we run rkt on a host with a lot of automount points or so when using coreos we could simply mount the parent directory into a pod and have the automounter on the host resolve requests from the pod this was great having switched to fly because of we see that submounts of parent mounted on the host are not visible in the pod which is for us a showstopper is there a work around otherwise we ll have to abandon our use of fly and revert to work arounds for environment rkt version appc version go version go os arch linux features tpm sdjournal linux elrepo name centos linux version core id centos id like rhel fedora version id pretty name centos linux core ansi color cpe name cpe o centos centos home url bug report url centos mantisbt project centos centos mantisbt project version redhat support product centos redhat support product version systemd pam audit selinux ima apparmor smack sysvinit utmp libcryptsetup gcrypt gnutls acl xz seccomp blkid elfutils kmod idn what did you do note automounter has already mounted required directory on host inscrutable df grep bioinformatics dev ignition active bioinformatics dev bifo active bioinformatics dev example with default coreos works fine inscrutable usr bin rkt insecure options image run volume bifo kind host source bifo quay io coreos alpine sh mount volume bifo target bifo exec bin sh c ls bifo active bioinformatics dev alpine sh bbmap alpine sh bgpa alpine sh boost alpine sh gbsx inscrutable example with fly doesn t see submount inscrutable usr bin rkt insecure options image run volume bifo kind host source bifo quay io coreos alpine sh mount volume bifo target bifo name coreos com rkt fly exec bin sh c ls bifo active bioinformatics dev ls bifo active bioinformatics dev no such file or directory what did you expect to see similar output from fly as for default coreos what did you see instead failed to access mounted subdirectory is there a way to get fly to see these submounts | 0 |
75,107 | 9,201,885,633 | IssuesEvent | 2019-03-07 20:51:19 | open-apparel-registry/open-apparel-registry | https://api.github.com/repos/open-apparel-registry/open-apparel-registry | closed | Design review of the facility matching page | design tested/verified | ## Overview
Logged in users can upload a CSV facility list at /contribute and that data is programmatically matched to a master list of facilities. Errors and uncertainties in that matching process are shown in a table view. Review the table view interface and make suggestions to improve the organization and usability of this page.
<img width="1232" alt="screen shot 2019-03-06 at 10 25 46 am" src="https://user-images.githubusercontent.com/17363/53901262-cd95d280-3ffb-11e9-9b94-e9146c531a49.png">
<img width="1232" alt="screen shot 2019-03-06 at 10 26 07 am" src="https://user-images.githubusercontent.com/17363/53901269-d4244a00-3ffb-11e9-8dee-711dcf15e1a6.png">
### Steps to populate the table view
- `vagrant ssh`
- `./scripts/manage resetdb`
- Browse http://localhost:6543/auth/register and register an account
- Log in
- Upload `src/django/api/management/commands/facility_lists/13.csv` via http://localhost:6543/contribute
- On the vagrant VM, run commands to fully process the CSV
- ./scripts/manage batch_process --list-id 15 --action parse
- ./scripts/manage batch_process --list-id 15 --action geocode
- ./scripts/manage batch_process --list-id 15 --action match
- Browse the list at http://localhost:6543/lists/15
| 1.0 | Design review of the facility matching page - ## Overview
Logged in users can upload a CSV facility list at /contribute and that data is programmatically matched to a master list of facilities. Errors and uncertainties in that matching process are shown in a table view. Review the table view interface and make suggestions to improve the organization and usability of this page.
<img width="1232" alt="screen shot 2019-03-06 at 10 25 46 am" src="https://user-images.githubusercontent.com/17363/53901262-cd95d280-3ffb-11e9-9b94-e9146c531a49.png">
<img width="1232" alt="screen shot 2019-03-06 at 10 26 07 am" src="https://user-images.githubusercontent.com/17363/53901269-d4244a00-3ffb-11e9-8dee-711dcf15e1a6.png">
### Steps to populate the table view
- `vagrant ssh`
- `./scripts/manage resetdb`
- Browse http://localhost:6543/auth/register and register an account
- Log in
- Upload `src/django/api/management/commands/facility_lists/13.csv` via http://localhost:6543/contribute
- On the vagrant VM, run commands to fully process the CSV
- ./scripts/manage batch_process --list-id 15 --action parse
- ./scripts/manage batch_process --list-id 15 --action geocode
- ./scripts/manage batch_process --list-id 15 --action match
- Browse the list at http://localhost:6543/lists/15
| non_priority | design review of the facility matching page overview logged in users can upload a csv facility list at contribute and that data is programmatically matched to a master list of facilities errors and uncertainties in that matching process are shown in a table view review the table view interface and make suggestions to improve the organization and usability of this page img width alt screen shot at am src img width alt screen shot at am src steps to populate the table view vagrant ssh scripts manage resetdb browse and register an account log in upload src django api management commands facility lists csv via on the vagrant vm run commands to fully process the csv scripts manage batch process list id action parse scripts manage batch process list id action geocode scripts manage batch process list id action match browse the list at | 0 |
16,982 | 9,958,511,900 | IssuesEvent | 2019-07-05 21:30:37 | n-psk/reactIOTEAU | https://api.github.com/repos/n-psk/reactIOTEAU | opened | WS-2019-0040 (Medium) detected in highcharts-5.0.15.tgz | security vulnerability | ## WS-2019-0040 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>highcharts-5.0.15.tgz</b></p></summary>
<p>JavaScript charting framework</p>
<p>Library home page: <a href="https://registry.npmjs.org/highcharts/-/highcharts-5.0.15.tgz">https://registry.npmjs.org/highcharts/-/highcharts-5.0.15.tgz</a></p>
<p>Path to dependency file: /reactIOTEAU/IOT-v0.2/package.json</p>
<p>Path to vulnerable library: /reactIOTEAU/IOT-v0.2/node_modules/highcharts/package.json,/reactIOTEAU/IOT-v0.2/node_modules/highcharts/package.json</p>
<p>
Dependency Hierarchy:
- :x: **highcharts-5.0.15.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://api.github.com/repos/n-psk/reactIOTEAU/commits/0042d14804cb7211d33e78b48b4ef637a69bb1f3">0042d14804cb7211d33e78b48b4ef637a69bb1f3</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Versions of highcharts prior to 6.1.0 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions.
<p>Publish Date: 2019-04-05
<p>URL: <a href=https://github.com/highcharts/highcharts/commit/7c547e1e0f5e4379f94396efd559a566668c0dfa>WS-2019-0040</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/793">https://www.npmjs.com/advisories/793</a></p>
<p>Release Date: 2019-04-05</p>
<p>Fix Resolution: 6.1.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2019-0040 (Medium) detected in highcharts-5.0.15.tgz - ## WS-2019-0040 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>highcharts-5.0.15.tgz</b></p></summary>
<p>JavaScript charting framework</p>
<p>Library home page: <a href="https://registry.npmjs.org/highcharts/-/highcharts-5.0.15.tgz">https://registry.npmjs.org/highcharts/-/highcharts-5.0.15.tgz</a></p>
<p>Path to dependency file: /reactIOTEAU/IOT-v0.2/package.json</p>
<p>Path to vulnerable library: /reactIOTEAU/IOT-v0.2/node_modules/highcharts/package.json,/reactIOTEAU/IOT-v0.2/node_modules/highcharts/package.json</p>
<p>
Dependency Hierarchy:
- :x: **highcharts-5.0.15.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://api.github.com/repos/n-psk/reactIOTEAU/commits/0042d14804cb7211d33e78b48b4ef637a69bb1f3">0042d14804cb7211d33e78b48b4ef637a69bb1f3</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Versions of highcharts prior to 6.1.0 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions.
<p>Publish Date: 2019-04-05
<p>URL: <a href=https://github.com/highcharts/highcharts/commit/7c547e1e0f5e4379f94396efd559a566668c0dfa>WS-2019-0040</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/793">https://www.npmjs.com/advisories/793</a></p>
<p>Release Date: 2019-04-05</p>
<p>Fix Resolution: 6.1.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | ws medium detected in highcharts tgz ws medium severity vulnerability vulnerable library highcharts tgz javascript charting framework library home page a href path to dependency file reactioteau iot package json path to vulnerable library reactioteau iot node modules highcharts package json reactioteau iot node modules highcharts package json dependency hierarchy x highcharts tgz vulnerable library found in head commit a href vulnerability details versions of highcharts prior to are vulnerable to regular expression denial of service redos untrusted input may cause catastrophic backtracking while matching regular expressions publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
19,917 | 10,430,974,064 | IssuesEvent | 2019-09-17 08:06:06 | hapijs/iron | https://api.github.com/repos/hapijs/iron | closed | Exposing PBKDF2 hashing algorithm for key generation, or just upgrading it | enhancement security | I was glancing through Iron and I noticed that there was a slight mismatch between the minimum password length and the key derivation method, namely the SHA-1 hashing algorithm used inside PBKDF2.
This post explains it pretty concisely I think (https://www.chosenplaintext.ca/2015/10/08/pbkdf2-design-flaw.html).
The TL:DR is that by using a password longer than the 20 bytes that SHA-1 outputs, pbkdf2 is doing twice the amount of iterations for little, if no benefit.
All I am proposing is to change the digest option used in pbkdf2 in the generateKey() function to sha256 at least, to use all 32 bytes meaningfully.
I realize this would break existing implementations, so exposing it as an option would also be fine. I'm willing to write a pull request to do so, just wanted to put my thoughts out there first so someone else could point out any flaws.
Also this is just a question, but why we are using PBKDF2 at all? Is there a need for multiple passes for this use case? As long as we are applying a salt shouldn't just HMAC-SHA be fine? | True | Exposing PBKDF2 hashing algorithm for key generation, or just upgrading it - I was glancing through Iron and I noticed that there was a slight mismatch between the minimum password length and the key derivation method, namely the SHA-1 hashing algorithm used inside PBKDF2.
This post explains it pretty concisely I think (https://www.chosenplaintext.ca/2015/10/08/pbkdf2-design-flaw.html).
The TL:DR is that by using a password longer than the 20 bytes that SHA-1 outputs, pbkdf2 is doing twice the amount of iterations for little, if no benefit.
All I am proposing is to change the digest option used in pbkdf2 in the generateKey() function to sha256 at least, to use all 32 bytes meaningfully.
I realize this would break existing implementations, so exposing it as an option would also be fine. I'm willing to write a pull request to do so, just wanted to put my thoughts out there first so someone else could point out any flaws.
Also this is just a question, but why we are using PBKDF2 at all? Is there a need for multiple passes for this use case? As long as we are applying a salt shouldn't just HMAC-SHA be fine? | non_priority | exposing hashing algorithm for key generation or just upgrading it i was glancing through iron and i noticed that there was a slight mismatch between the minimum password length and the key derivation method namely the sha hashing algorithm used inside this post explains it pretty concisely i think the tl dr is that by using a password longer than the bytes that sha outputs is doing twice the amount of iterations for little if no benefit all i am proposing is to change the digest option used in in the generatekey function to at least to use all bytes meaningfully i realize this would break existing implementations so exposing it as an option would also be fine i m willing to write a pull request to do so just wanted to put my thoughts out there first so someone else could point out any flaws also this is just a question but why we are using at all is there a need for multiple passes for this use case as long as we are applying a salt shouldn t just hmac sha be fine | 0 |
108,852 | 23,671,728,150 | IssuesEvent | 2022-08-27 13:10:31 | kiwiproject/kiwi-test | https://api.github.com/repos/kiwiproject/kiwi-test | closed | Can we remove the dependency on commons-io from H2FileBasedDatabaseExtension? | investigation code cleanup | It is only required because the `H2FileBasedDatabaseExtension` uses `FileUtils.deleteDirectory` to recursively delete the H2 database directly. If we can find a JDK (or even Guava) alternative, then we can remove the `commons-io` dependency entirely since this is the only place `kiwi-test` uses anything from it. | 1.0 | Can we remove the dependency on commons-io from H2FileBasedDatabaseExtension? - It is only required because the `H2FileBasedDatabaseExtension` uses `FileUtils.deleteDirectory` to recursively delete the H2 database directly. If we can find a JDK (or even Guava) alternative, then we can remove the `commons-io` dependency entirely since this is the only place `kiwi-test` uses anything from it. | non_priority | can we remove the dependency on commons io from it is only required because the uses fileutils deletedirectory to recursively delete the database directly if we can find a jdk or even guava alternative then we can remove the commons io dependency entirely since this is the only place kiwi test uses anything from it | 0 |
7,928 | 8,124,120,793 | IssuesEvent | 2018-08-16 16:29:24 | Microsoft/visualfsharp | https://api.github.com/repos/Microsoft/visualfsharp | closed | Rename Feature Corrupts Unsaved Files in VS2017 15.7.1 | Area-IDE Language Service Urgency-Soon | When you rename a symbol that exists in another file that is open with pending changes, the rename operation is computed using the character positions of the _unsaved_ file. This means if you've added _any_ lines or changed target symbol positions in the target files, the replace operation will overwrite any text that existed at the old offsets.
UPDATE: While writing this issue I have now also encountered the crashing issues when renaming symbols added and used within the same unsaved file. (seems related to #4655 and #2204).
#### Repro steps
1. Open a source file which contains a symbol that is defined in another source file.

2. Add a few lines of code _above_ where that symbol is used. **DO NOT SAVE YET**

3. Go to the definition of that symbol in the other file (F12). and use the Rename feature (Ctrl+R+R) to rename that symbol.

4. The Rename operation overwrites code above where the actual symbols were used and saves the file, corrupting the source code.

#### Bonus Content
Interestingly, I tried it again with Preview Changes enabled, and the resulting preview window actually shows the corruption:

#### Repro Solution ZIP
[VS2017.15.7.1-BlindRenameOffsetIssue.zip](https://github.com/Microsoft/visualfsharp/files/2011226/VS2017.15.7.1-BlindRenameOffsetIssue.zip)
#### Expected behavior
Rename feature properly renames usages in open / modified files.
#### Actual behavior
Rename feature uses old buffer to calculate rename operations, overwriting current buffer and saving the file.
#### Known workarounds
Only to save all open files before performing any rename operations.
#### Related information
Provide any related information
* Operating system
* Windows 10, Version 1709 (16299.309)
* Branch
* 15.7.1 public release
* .NET Runtime, CoreCLR or Mono Version
* .NET Framework 4.7.1
* Editing Tools (e.g. Visual Studio Version)
* Visual Studio 15.7.1
* Indications of severity
* This issue and the related Rename->VSCrash issues can cause data loss.
| 1.0 | Rename Feature Corrupts Unsaved Files in VS2017 15.7.1 - When you rename a symbol that exists in another file that is open with pending changes, the rename operation is computed using the character positions of the _unsaved_ file. This means if you've added _any_ lines or changed target symbol positions in the target files, the replace operation will overwrite any text that existed at the old offsets.
UPDATE: While writing this issue I have now also encountered the crashing issues when renaming symbols added and used within the same unsaved file. (seems related to #4655 and #2204).
#### Repro steps
1. Open a source file which contains a symbol that is defined in another source file.

2. Add a few lines of code _above_ where that symbol is used. **DO NOT SAVE YET**

3. Go to the definition of that symbol in the other file (F12). and use the Rename feature (Ctrl+R+R) to rename that symbol.

4. The Rename operation overwrites code above where the actual symbols were used and saves the file, corrupting the source code.

#### Bonus Content
Interestingly, I tried it again with Preview Changes enabled, and the resulting preview window actually shows the corruption:

#### Repro Solution ZIP
[VS2017.15.7.1-BlindRenameOffsetIssue.zip](https://github.com/Microsoft/visualfsharp/files/2011226/VS2017.15.7.1-BlindRenameOffsetIssue.zip)
#### Expected behavior
Rename feature properly renames usages in open / modified files.
#### Actual behavior
Rename feature uses old buffer to calculate rename operations, overwriting current buffer and saving the file.
#### Known workarounds
Only to save all open files before performing any rename operations.
#### Related information
Provide any related information
* Operating system
* Windows 10, Version 1709 (16299.309)
* Branch
* 15.7.1 public release
* .NET Runtime, CoreCLR or Mono Version
* .NET Framework 4.7.1
* Editing Tools (e.g. Visual Studio Version)
* Visual Studio 15.7.1
* Indications of severity
* This issue and the related Rename->VSCrash issues can cause data loss.
| non_priority | rename feature corrupts unsaved files in when you rename a symbol that exists in another file that is open with pending changes the rename operation is computed using the character positions of the unsaved file this means if you ve added any lines or changed target symbol positions in the target files the replace operation will overwrite any text that existed at the old offsets update while writing this issue i have now also encountered the crashing issues when renaming symbols added and used within the same unsaved file seems related to and repro steps open a source file which contains a symbol that is defined in another source file add a few lines of code above where that symbol is used do not save yet go to the definition of that symbol in the other file and use the rename feature ctrl r r to rename that symbol the rename operation overwrites code above where the actual symbols were used and saves the file corrupting the source code bonus content interestingly i tried it again with preview changes enabled and the resulting preview window actually shows the corruption repro solution zip expected behavior rename feature properly renames usages in open modified files actual behavior rename feature uses old buffer to calculate rename operations overwriting current buffer and saving the file known workarounds only to save all open files before performing any rename operations related information provide any related information operating system windows version branch public release net runtime coreclr or mono version net framework editing tools e g visual studio version visual studio indications of severity this issue and the related rename vscrash issues can cause data loss | 0 |
152,821 | 19,697,598,591 | IssuesEvent | 2022-01-12 13:45:14 | RG4421/mmRTLS | https://api.github.com/repos/RG4421/mmRTLS | closed | CVE-2021-35065 (Medium) detected in glob-parent-2.0.0.tgz, glob-parent-5.1.2.tgz - autoclosed | security vulnerability | ## CVE-2021-35065 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-5.1.2.tgz</b></p></summary>
<p>
<details><summary><b>glob-parent-2.0.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p>
<p>Path to dependency file: /ctrlSrv/processor/package.json</p>
<p>Path to vulnerable library: /ctrlSrv/processor/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- babel-cli-6.26.0.tgz (Root Library)
- chokidar-1.7.0.tgz
- :x: **glob-parent-2.0.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>glob-parent-5.1.2.tgz</b></p></summary>
<p>Extract the non-magic parent path from a glob string.</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz</a></p>
<p>
Dependency Hierarchy:
- eslint-7.26.0.tgz (Root Library)
- :x: **glob-parent-5.1.2.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS)
<p>Publish Date: 2021-06-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065>CVE-2021-35065</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/gulpjs/glob-parent/pull/49">https://github.com/gulpjs/glob-parent/pull/49</a></p>
<p>Release Date: 2021-06-22</p>
<p>Fix Resolution: glob-parent - 6.0.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"2.0.0","packageFilePaths":["/ctrlSrv/processor/package.json"],"isTransitiveDependency":true,"dependencyTree":"babel-cli:6.26.0;chokidar:1.7.0;glob-parent:2.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 6.0.1","isBinary":false},{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"5.1.2","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"eslint:7.26.0;glob-parent:5.1.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 6.0.1","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-35065","vulnerabilityDetails":"The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS) ","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | True | CVE-2021-35065 (Medium) detected in glob-parent-2.0.0.tgz, glob-parent-5.1.2.tgz - autoclosed - ## CVE-2021-35065 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-5.1.2.tgz</b></p></summary>
<p>
<details><summary><b>glob-parent-2.0.0.tgz</b></p></summary>
<p>Strips glob magic from a string to provide the parent path</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p>
<p>Path to dependency file: /ctrlSrv/processor/package.json</p>
<p>Path to vulnerable library: /ctrlSrv/processor/node_modules/glob-parent/package.json</p>
<p>
Dependency Hierarchy:
- babel-cli-6.26.0.tgz (Root Library)
- chokidar-1.7.0.tgz
- :x: **glob-parent-2.0.0.tgz** (Vulnerable Library)
</details>
<details><summary><b>glob-parent-5.1.2.tgz</b></p></summary>
<p>Extract the non-magic parent path from a glob string.</p>
<p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz</a></p>
<p>
Dependency Hierarchy:
- eslint-7.26.0.tgz (Root Library)
- :x: **glob-parent-5.1.2.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS)
<p>Publish Date: 2021-06-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065>CVE-2021-35065</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/gulpjs/glob-parent/pull/49">https://github.com/gulpjs/glob-parent/pull/49</a></p>
<p>Release Date: 2021-06-22</p>
<p>Fix Resolution: glob-parent - 6.0.1</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"2.0.0","packageFilePaths":["/ctrlSrv/processor/package.json"],"isTransitiveDependency":true,"dependencyTree":"babel-cli:6.26.0;chokidar:1.7.0;glob-parent:2.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 6.0.1","isBinary":false},{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"5.1.2","packageFilePaths":[null],"isTransitiveDependency":true,"dependencyTree":"eslint:7.26.0;glob-parent:5.1.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 6.0.1","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-35065","vulnerabilityDetails":"The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS) ","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35065","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in glob parent tgz glob parent tgz autoclosed cve medium severity vulnerability vulnerable libraries glob parent tgz glob parent tgz glob parent tgz strips glob magic from a string to provide the parent path library home page a href path to dependency file ctrlsrv processor package json path to vulnerable library ctrlsrv processor node modules glob parent package json dependency hierarchy babel cli tgz root library chokidar tgz x glob parent tgz vulnerable library glob parent tgz extract the non magic parent path from a glob string library home page a href dependency hierarchy eslint tgz root library x glob parent tgz vulnerable library found in base branch main vulnerability details the package glob parent before are vulnerable to regular expression denial of service redos publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution glob parent isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree babel cli chokidar glob parent isminimumfixversionavailable true minimumfixversion glob parent isbinary false packagetype javascript node js packagename glob parent packageversion packagefilepaths istransitivedependency true dependencytree eslint glob parent isminimumfixversionavailable true minimumfixversion glob parent isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails the package glob parent before are vulnerable to regular expression denial of service redos vulnerabilityurl | 0 |
287,641 | 21,663,998,077 | IssuesEvent | 2022-05-07 00:02:58 | miversen33/netman.nvim | https://api.github.com/repos/miversen33/netman.nvim | closed | Netman Options (`netman.options`) Needs documentation | documentation Core | Title is self explanatory. Netman Options are used everywhere and have effectively no documentation.
We should absolutely have a vim doc for this, and probably also worth throwing something in the `wiki` for it. | 1.0 | Netman Options (`netman.options`) Needs documentation - Title is self explanatory. Netman Options are used everywhere and have effectively no documentation.
We should absolutely have a vim doc for this, and probably also worth throwing something in the `wiki` for it. | non_priority | netman options netman options needs documentation title is self explanatory netman options are used everywhere and have effectively no documentation we should absolutely have a vim doc for this and probably also worth throwing something in the wiki for it | 0 |
95,532 | 16,096,805,712 | IssuesEvent | 2021-04-27 01:51:40 | emilwareus/spring-boot | https://api.github.com/repos/emilwareus/spring-boot | opened | CVE-2021-28168 (Medium) detected in jersey-common-2.28.jar | security vulnerability | ## CVE-2021-28168 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jersey-common-2.28.jar</b></p></summary>
<p>Jersey core common packages</p>
<p>Library home page: <a href="https://projects.eclipse.org/projects/ee4j.jersey">https://projects.eclipse.org/projects/ee4j.jersey</a></p>
<p>Path to dependency file: /spring-boot/spring-boot-project/spring-boot-autoconfigure/pom.xml</p>
<p>Path to vulnerable library: /root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar,/root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar,/root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar,/root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar,/root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar</p>
<p>
Dependency Hierarchy:
- jersey-container-servlet-core-2.28.jar (Root Library)
- :x: **jersey-common-2.28.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Eclipse Jersey 2.28 to 2.33 and Eclipse Jersey 3.0.0 to 3.0.1 contains a local information disclosure vulnerability. This is due to the use of the File.createTempFile which creates a file inside of the system temporary directory with the permissions: -rw-r--r--. Thus the contents of this file are viewable by all other users locally on the system. As such, if the contents written is security sensitive, it can be disclosed to other local users.
<p>Publish Date: 2021-04-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28168>CVE-2021-28168</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.2</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse-ee4j/jersey/security/advisories/GHSA-c43q-5hpj-4crv">https://github.com/eclipse-ee4j/jersey/security/advisories/GHSA-c43q-5hpj-4crv</a></p>
<p>Release Date: 2021-04-22</p>
<p>Fix Resolution: org.glassfish.jersey.core:jersey-common:2.34,3.0.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-28168 (Medium) detected in jersey-common-2.28.jar - ## CVE-2021-28168 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jersey-common-2.28.jar</b></p></summary>
<p>Jersey core common packages</p>
<p>Library home page: <a href="https://projects.eclipse.org/projects/ee4j.jersey">https://projects.eclipse.org/projects/ee4j.jersey</a></p>
<p>Path to dependency file: /spring-boot/spring-boot-project/spring-boot-autoconfigure/pom.xml</p>
<p>Path to vulnerable library: /root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar,/root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar,/root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar,/root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar,/root/.m2/repository/org/glassfish/jersey/core/jersey-common/2.28/jersey-common-2.28.jar</p>
<p>
Dependency Hierarchy:
- jersey-container-servlet-core-2.28.jar (Root Library)
- :x: **jersey-common-2.28.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Eclipse Jersey 2.28 to 2.33 and Eclipse Jersey 3.0.0 to 3.0.1 contains a local information disclosure vulnerability. This is due to the use of the File.createTempFile which creates a file inside of the system temporary directory with the permissions: -rw-r--r--. Thus the contents of this file are viewable by all other users locally on the system. As such, if the contents written is security sensitive, it can be disclosed to other local users.
<p>Publish Date: 2021-04-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-28168>CVE-2021-28168</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.2</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse-ee4j/jersey/security/advisories/GHSA-c43q-5hpj-4crv">https://github.com/eclipse-ee4j/jersey/security/advisories/GHSA-c43q-5hpj-4crv</a></p>
<p>Release Date: 2021-04-22</p>
<p>Fix Resolution: org.glassfish.jersey.core:jersey-common:2.34,3.0.2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in jersey common jar cve medium severity vulnerability vulnerable library jersey common jar jersey core common packages library home page a href path to dependency file spring boot spring boot project spring boot autoconfigure pom xml path to vulnerable library root repository org glassfish jersey core jersey common jersey common jar root repository org glassfish jersey core jersey common jersey common jar root repository org glassfish jersey core jersey common jersey common jar root repository org glassfish jersey core jersey common jersey common jar root repository org glassfish jersey core jersey common jersey common jar dependency hierarchy jersey container servlet core jar root library x jersey common jar vulnerable library vulnerability details eclipse jersey to and eclipse jersey to contains a local information disclosure vulnerability this is due to the use of the file createtempfile which creates a file inside of the system temporary directory with the permissions rw r r thus the contents of this file are viewable by all other users locally on the system as such if the contents written is security sensitive it can be disclosed to other local users publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org glassfish jersey core jersey common step up your open source security game with whitesource | 0 |
281,703 | 24,413,370,035 | IssuesEvent | 2022-10-05 14:07:07 | apache/beam | https://api.github.com/repos/apache/beam | closed | Dataflow streaming tests failing new AfterSynchronizedProcessingTime test | runners dataflow P1 bug test-failures flake | The new test `org.apache.beam.sdk.transforms.GroupByKeyTest$BasicTests.testAfterProcessingTimeContinuationTriggerUsingState` is failing on Dataflow streaming. Most likely the delays are not large enough for Dataflow's bundle latency, so the triggering does not occur early.
https://ci-beam.apache.org/job/beam_PostCommit_Java_ValidatesRunner_Dataflow_Streaming/1876/testReport/junit/org.apache.beam.sdk.transforms/GroupByKeyTest$BasicTests/testAfterProcessingTimeContinuationTriggerUsingState/
Imported from Jira [BEAM-13952](https://issues.apache.org/jira/browse/BEAM-13952). Original Jira may contain additional context.
Reported by: kenn. | 1.0 | Dataflow streaming tests failing new AfterSynchronizedProcessingTime test - The new test `org.apache.beam.sdk.transforms.GroupByKeyTest$BasicTests.testAfterProcessingTimeContinuationTriggerUsingState` is failing on Dataflow streaming. Most likely the delays are not large enough for Dataflow's bundle latency, so the triggering does not occur early.
https://ci-beam.apache.org/job/beam_PostCommit_Java_ValidatesRunner_Dataflow_Streaming/1876/testReport/junit/org.apache.beam.sdk.transforms/GroupByKeyTest$BasicTests/testAfterProcessingTimeContinuationTriggerUsingState/
Imported from Jira [BEAM-13952](https://issues.apache.org/jira/browse/BEAM-13952). Original Jira may contain additional context.
Reported by: kenn. | non_priority | dataflow streaming tests failing new aftersynchronizedprocessingtime test the new test org apache beam sdk transforms groupbykeytest basictests testafterprocessingtimecontinuationtriggerusingstate is failing on dataflow streaming most likely the delays are not large enough for dataflow s bundle latency so the triggering does not occur early imported from jira original jira may contain additional context reported by kenn | 0 |
39,259 | 5,064,659,089 | IssuesEvent | 2016-12-23 08:00:18 | tor4kichi/Hohoema | https://api.github.com/repos/tor4kichi/Hohoema | opened | メニューを含めたベースレイアウトを修正 | ui_design | 以下の画面タイプごとにレイアウトが適用されるように変更します。
* 中~大画面向け
* モバイル向け
* XInput向け
PCで操作中の場合にXInputレイアウトを使用しないオプションを利用可能にします。 | 1.0 | メニューを含めたベースレイアウトを修正 - 以下の画面タイプごとにレイアウトが適用されるように変更します。
* 中~大画面向け
* モバイル向け
* XInput向け
PCで操作中の場合にXInputレイアウトを使用しないオプションを利用可能にします。 | non_priority | メニューを含めたベースレイアウトを修正 以下の画面タイプごとにレイアウトが適用されるように変更します。 中~大画面向け モバイル向け xinput向け pcで操作中の場合にxinputレイアウトを使用しないオプションを利用可能にします。 | 0 |
31,814 | 6,001,046,088 | IssuesEvent | 2017-06-05 07:52:04 | brave/browser-laptop | https://api.github.com/repos/brave/browser-laptop | closed | Snap Package for Brave | documentation ✍ installation OS/linux-distros QA/no-qa-needed release-notes/exclude suggestion | - Did you search for similar issues before submitting this one?
**Yes**
- Describe the issue you encountered:
**Installing on Ubuntu, derivatives, and Linux in general could be much easier.**
- Platform (Win7, 8, 10? macOS? Linux distro?):
**Ubuntu and Elementary (Linux)**
### What are Snaps?
Snap packaging was developed in order to make installation of software easier on Linux, and to make targeting the platform as a whole simpler for developers. Ubuntu is currently accepting Snap packages into its app store through their [developer portal](https://myapps.developer.ubuntu.com/dev/click-apps/). This would serve as an easier way for getting Brave on Ubuntu, and if snapd is installed on other distributions the installation is very straightforward as well. *Snaps* is a nickname for a snap package.
### How much work is it?
Electron Builder now supports the generation of a snap package. This should make it much simpler to implement into the current process fairly easily. The options are detailed on the [Electron Builder wiki](https://github.com/electron-userland/electron-builder/wiki/Options#SnapOptions).
The Ubuntu community has been amazing about helping projects get their software packaged as snaps. If this is a target the Brave community is interested in hitting, then we can tap the Ubuntu folks for help and I'm sure they will gladly lend their aide. | 1.0 | Snap Package for Brave - - Did you search for similar issues before submitting this one?
**Yes**
- Describe the issue you encountered:
**Installing on Ubuntu, derivatives, and Linux in general could be much easier.**
- Platform (Win7, 8, 10? macOS? Linux distro?):
**Ubuntu and Elementary (Linux)**
### What are Snaps?
Snap packaging was developed in order to make installation of software easier on Linux, and to make targeting the platform as a whole simpler for developers. Ubuntu is currently accepting Snap packages into its app store through their [developer portal](https://myapps.developer.ubuntu.com/dev/click-apps/). This would serve as an easier way for getting Brave on Ubuntu, and if snapd is installed on other distributions the installation is very straightforward as well. *Snaps* is a nickname for a snap package.
### How much work is it?
Electron Builder now supports the generation of a snap package. This should make it much simpler to implement into the current process fairly easily. The options are detailed on the [Electron Builder wiki](https://github.com/electron-userland/electron-builder/wiki/Options#SnapOptions).
The Ubuntu community has been amazing about helping projects get their software packaged as snaps. If this is a target the Brave community is interested in hitting, then we can tap the Ubuntu folks for help and I'm sure they will gladly lend their aide. | non_priority | snap package for brave did you search for similar issues before submitting this one yes describe the issue you encountered installing on ubuntu derivatives and linux in general could be much easier platform macos linux distro ubuntu and elementary linux what are snaps snap packaging was developed in order to make installation of software easier on linux and to make targeting the platform as a whole simpler for developers ubuntu is currently accepting snap packages into its app store through their this would serve as an easier way for getting brave on ubuntu and if snapd is installed on other distributions the installation is very straightforward as well snaps is a nickname for a snap package how much work is it electron builder now supports the generation of a snap package this should make it much simpler to implement into the current process fairly easily the options are detailed on the the ubuntu community has been amazing about helping projects get their software packaged as snaps if this is a target the brave community is interested in hitting then we can tap the ubuntu folks for help and i m sure they will gladly lend their aide | 0 |
4,881 | 3,897,418,196 | IssuesEvent | 2016-04-16 12:01:58 | lionheart/openradar-mirror | https://api.github.com/repos/lionheart/openradar-mirror | opened | 15632010: Cycling between spaces for an application by clicking the dock icon does not update keyboard focus | classification:ui/usability reproducible:always status:open | #### Description
Summary:
On 10.9 (I don't have a 10.8 machine handy to test against), clicking the dock icon for an application with windows on multiple spaces does not update keyboard focus cycling between spaces.
Steps to Reproduce:
1. Open two TextEdit windows. (I've also reproduced this with Preview, Safari, and Terminal.)
2. Place each window on a separate space.
3. Focus the content area (for other applications, some widget that takes keyboard input like the address bar in Safari) in each window.
4. Activate one of the windows. Keep the content area focused.
5. Click the TextEdit dock icon to switch to the workspace containing the other window.
6. Hit some keys.
Expected Results:
The keystrokes get sent to the newly active window (or perhaps no window at all).
Actual Results:
The keystrokes appear in the old window on the previous space. Depending on the application, this may be invisible or it may switch you back to the space containing the old window.
Version:
10.9
Notes:
Configuration:
Attachments:
-
Product Version: 10.9
Created: 2013-12-11T00:11:58.040929
Originated: 2013-12-10T00:00:00
Open Radar Link: http://www.openradar.me/15632010 | True | 15632010: Cycling between spaces for an application by clicking the dock icon does not update keyboard focus - #### Description
Summary:
On 10.9 (I don't have a 10.8 machine handy to test against), clicking the dock icon for an application with windows on multiple spaces does not update keyboard focus cycling between spaces.
Steps to Reproduce:
1. Open two TextEdit windows. (I've also reproduced this with Preview, Safari, and Terminal.)
2. Place each window on a separate space.
3. Focus the content area (for other applications, some widget that takes keyboard input like the address bar in Safari) in each window.
4. Activate one of the windows. Keep the content area focused.
5. Click the TextEdit dock icon to switch to the workspace containing the other window.
6. Hit some keys.
Expected Results:
The keystrokes get sent to the newly active window (or perhaps no window at all).
Actual Results:
The keystrokes appear in the old window on the previous space. Depending on the application, this may be invisible or it may switch you back to the space containing the old window.
Version:
10.9
Notes:
Configuration:
Attachments:
-
Product Version: 10.9
Created: 2013-12-11T00:11:58.040929
Originated: 2013-12-10T00:00:00
Open Radar Link: http://www.openradar.me/15632010 | non_priority | cycling between spaces for an application by clicking the dock icon does not update keyboard focus description summary on i don t have a machine handy to test against clicking the dock icon for an application with windows on multiple spaces does not update keyboard focus cycling between spaces steps to reproduce open two textedit windows i ve also reproduced this with preview safari and terminal place each window on a separate space focus the content area for other applications some widget that takes keyboard input like the address bar in safari in each window activate one of the windows keep the content area focused click the textedit dock icon to switch to the workspace containing the other window hit some keys expected results the keystrokes get sent to the newly active window or perhaps no window at all actual results the keystrokes appear in the old window on the previous space depending on the application this may be invisible or it may switch you back to the space containing the old window version notes configuration attachments product version created originated open radar link | 0 |
128,108 | 17,410,631,314 | IssuesEvent | 2021-08-03 11:52:42 | Joystream/atlas | https://api.github.com/repos/Joystream/atlas | closed | Atlas Player: Design Ideas Backlog | design enhancement idea player ⚙ component:player | # Document Purpose
This document aims to gather all ideas for improvements and new functionalities around Atlas' video player. Design-wise, ideally, all the things below are tackled during one go.
Implementation-wise, the below items can be taken apart from the list and implemented at different points in time, as I see no mutual dependence in the below functionalities atm. It does not apply to functionalities marked as critical.
Regarding the order of implementation, following the order in which ideas are presented below would be preferable.
## Changes/adjustments:
### #821 Player's UI revamp/overhaul (🚨 Critical)
- To make the currently available controls visually aligned with the JS design system (through the use of components from the JS component library or through introducing new components, based on previously established style guide).
- To ensure a working mobile experience for each functionality mentioned below.
### #821 Adjustments to the logic behind showing/hiding player's UI
- To hide the player's UI immediately after the cursor leaves the player area.
- To hide the player's UI after **3 seconds** (? to be confirmed through research and testing) after the playing has been resumed.
### #822 Adjust states of the player
- To introduce an error state for (#40):
- Failed to load the whole video page,
- Failed to load the media file,
- To introduce states for video completion (#52):
- When the standalone video finished playing,
- When the playlist video finished playing.
## New functionalities:
### #823 Introduce keyboard shortcuts
Key(s) | Action | Visual Feedback
------------ | ------------- | -------------
`Spacebar` , `k` | Play/pause | Yes
`←` and `→` | Seek backward/forwards by 5 seconds | Yes
`J` and `L` | Seek backward/forwards by 10 second
`↑` and `↓` | Increase/decrease volume by 10% | Yes
`M` | Toggle mute | Yes
`F` and `Escape` | Toggle full-screen mode
### #824 Video preview when scrubbing
To allow the user to preview the video at the selected point on the timeline.
### #825 Quality controls
To allow the user to change the quality of the playback (eg. 360p, 480p, 720p, 1080p, etc.), providing an “Auto” option at the same time.
### #825 Playback speed controls
To allow the user to change the speed of the playback (eg. 0.25, 0.5, 0.75, 1, 1.25, 1.5, 1.75, 2).
### #825 CC/Subtitles
To allow the user to enable/disable CC or subtitles included with the video during upload.
### #826 Casting
To allow the user to cast the video to a TV.
### #827 Prev/next controls
To allow the user to jump into previous (in case of playlists) and/or next (in case of playlists, otherwise: suggested) videos.
### #828 In-player social features
To allow the user to share a video from the player:
- Copy/generate a link,
- Include a timestamp,
- Share on social media platforms (the list of platforms to be finalized through a research),
## Other
### Adjust the video page
- To introduce suggested videos section (as opposed to only having other videos from the same author),
- To introduce a default player mode (size, as opposed to the current “cinema-mode”),
- To introduce a platform-wide PIP mode (to allow the user to navigate into different screens/pages in the app, while watching the video),
| 1.0 | Atlas Player: Design Ideas Backlog - # Document Purpose
This document aims to gather all ideas for improvements and new functionalities around Atlas' video player. Design-wise, ideally, all the things below are tackled during one go.
Implementation-wise, the below items can be taken apart from the list and implemented at different points in time, as I see no mutual dependence in the below functionalities atm. It does not apply to functionalities marked as critical.
Regarding the order of implementation, following the order in which ideas are presented below would be preferable.
## Changes/adjustments:
### #821 Player's UI revamp/overhaul (🚨 Critical)
- To make the currently available controls visually aligned with the JS design system (through the use of components from the JS component library or through introducing new components, based on previously established style guide).
- To ensure a working mobile experience for each functionality mentioned below.
### #821 Adjustments to the logic behind showing/hiding player's UI
- To hide the player's UI immediately after the cursor leaves the player area.
- To hide the player's UI after **3 seconds** (? to be confirmed through research and testing) after the playing has been resumed.
### #822 Adjust states of the player
- To introduce an error state for (#40):
- Failed to load the whole video page,
- Failed to load the media file,
- To introduce states for video completion (#52):
- When the standalone video finished playing,
- When the playlist video finished playing.
## New functionalities:
### #823 Introduce keyboard shortcuts
Key(s) | Action | Visual Feedback
------------ | ------------- | -------------
`Spacebar` , `k` | Play/pause | Yes
`←` and `→` | Seek backward/forwards by 5 seconds | Yes
`J` and `L` | Seek backward/forwards by 10 second
`↑` and `↓` | Increase/decrease volume by 10% | Yes
`M` | Toggle mute | Yes
`F` and `Escape` | Toggle full-screen mode
### #824 Video preview when scrubbing
To allow the user to preview the video at the selected point on the timeline.
### #825 Quality controls
To allow the user to change the quality of the playback (eg. 360p, 480p, 720p, 1080p, etc.), providing an “Auto” option at the same time.
### #825 Playback speed controls
To allow the user to change the speed of the playback (eg. 0.25, 0.5, 0.75, 1, 1.25, 1.5, 1.75, 2).
### #825 CC/Subtitles
To allow the user to enable/disable CC or subtitles included with the video during upload.
### #826 Casting
To allow the user to cast the video to a TV.
### #827 Prev/next controls
To allow the user to jump into previous (in case of playlists) and/or next (in case of playlists, otherwise: suggested) videos.
### #828 In-player social features
To allow the user to share a video from the player:
- Copy/generate a link,
- Include a timestamp,
- Share on social media platforms (the list of platforms to be finalized through a research),
## Other
### Adjust the video page
- To introduce suggested videos section (as opposed to only having other videos from the same author),
- To introduce a default player mode (size, as opposed to the current “cinema-mode”),
- To introduce a platform-wide PIP mode (to allow the user to navigate into different screens/pages in the app, while watching the video),
| non_priority | atlas player design ideas backlog document purpose this document aims to gather all ideas for improvements and new functionalities around atlas video player design wise ideally all the things below are tackled during one go implementation wise the below items can be taken apart from the list and implemented at different points in time as i see no mutual dependence in the below functionalities atm it does not apply to functionalities marked as critical regarding the order of implementation following the order in which ideas are presented below would be preferable changes adjustments player s ui revamp overhaul 🚨 critical to make the currently available controls visually aligned with the js design system through the use of components from the js component library or through introducing new components based on previously established style guide to ensure a working mobile experience for each functionality mentioned below adjustments to the logic behind showing hiding player s ui to hide the player s ui immediately after the cursor leaves the player area to hide the player s ui after seconds to be confirmed through research and testing after the playing has been resumed adjust states of the player to introduce an error state for failed to load the whole video page failed to load the media file to introduce states for video completion when the standalone video finished playing when the playlist video finished playing new functionalities introduce keyboard shortcuts key s action visual feedback spacebar k play pause yes ← and → seek backward forwards by seconds yes j and l seek backward forwards by second ↑ and ↓ increase decrease volume by yes m toggle mute yes f and escape toggle full screen mode video preview when scrubbing to allow the user to preview the video at the selected point on the timeline quality controls to allow the user to change the quality of the playback eg etc providing an “auto” option at the same time playback speed controls to allow the user to change the speed of the playback eg cc subtitles to allow the user to enable disable cc or subtitles included with the video during upload casting to allow the user to cast the video to a tv prev next controls to allow the user to jump into previous in case of playlists and or next in case of playlists otherwise suggested videos in player social features to allow the user to share a video from the player copy generate a link include a timestamp share on social media platforms the list of platforms to be finalized through a research other adjust the video page to introduce suggested videos section as opposed to only having other videos from the same author to introduce a default player mode size as opposed to the current “cinema mode” to introduce a platform wide pip mode to allow the user to navigate into different screens pages in the app while watching the video | 0 |
138,802 | 18,795,945,487 | IssuesEvent | 2021-11-08 22:20:41 | Dima2022/blueflood | https://api.github.com/repos/Dima2022/blueflood | opened | CVE-2020-36184 (High) detected in jackson-databind-2.3.1.jar, jackson-databind-2.9.2.jar | security vulnerability | ## CVE-2020-36184 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.3.1.jar</b>, <b>jackson-databind-2.9.2.jar</b></p></summary>
<p>
<details><summary><b>jackson-databind-2.3.1.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Path to dependency file: blueflood/contrib/logstash-support/pom.xml</p>
<p>Path to vulnerable library: 0302_PLDTMW/downloadResource_SLAJUO/20211108221834/jackson-databind-2.3.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.3.1.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.9.2.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: blueflood/blueflood-elasticsearch/pom.xml</p>
<p>Path to vulnerable library: /repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.9.2.jar** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/Dima2022/blueflood/commit/d7a020f20084b3c541eb9593532d06fd240bb549">d7a020f20084b3c541eb9593532d06fd240bb549</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.
<p>Publish Date: 2021-01-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184>CVE-2020-36184</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2998">https://github.com/FasterXML/jackson-databind/issues/2998</a></p>
<p>Release Date: 2021-01-06</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.3.1","packageFilePaths":["/contrib/logstash-support/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.3.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.2","packageFilePaths":["/blueflood-elasticsearch/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-36184","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-36184 (High) detected in jackson-databind-2.3.1.jar, jackson-databind-2.9.2.jar - ## CVE-2020-36184 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.3.1.jar</b>, <b>jackson-databind-2.9.2.jar</b></p></summary>
<p>
<details><summary><b>jackson-databind-2.3.1.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Path to dependency file: blueflood/contrib/logstash-support/pom.xml</p>
<p>Path to vulnerable library: 0302_PLDTMW/downloadResource_SLAJUO/20211108221834/jackson-databind-2.3.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.3.1.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.9.2.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: blueflood/blueflood-elasticsearch/pom.xml</p>
<p>Path to vulnerable library: /repository/com/fasterxml/jackson/core/jackson-databind/2.9.2/jackson-databind-2.9.2.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.9.2.jar** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/Dima2022/blueflood/commit/d7a020f20084b3c541eb9593532d06fd240bb549">d7a020f20084b3c541eb9593532d06fd240bb549</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.
<p>Publish Date: 2021-01-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184>CVE-2020-36184</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2998">https://github.com/FasterXML/jackson-databind/issues/2998</a></p>
<p>Release Date: 2021-01-06</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.3.1","packageFilePaths":["/contrib/logstash-support/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.3.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.2","packageFilePaths":["/blueflood-elasticsearch/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-36184","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-36184","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in jackson databind jar jackson databind jar cve high severity vulnerability vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api path to dependency file blueflood contrib logstash support pom xml path to vulnerable library pldtmw downloadresource slajuo jackson databind jar dependency hierarchy x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file blueflood blueflood elasticsearch pom xml path to vulnerable library repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp datasources peruserpooldatasource publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind packagetype java groupid com fasterxml jackson core packagename jackson databind packageversion packagefilepaths istransitivedependency false dependencytree com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind basebranches vulnerabilityidentifier cve vulnerabilitydetails fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache tomcat dbcp datasources peruserpooldatasource vulnerabilityurl | 0 |
7,171 | 16,902,649,427 | IssuesEvent | 2021-06-24 00:25:32 | privacy-tech-lab/optmeowt-browser-extension | https://api.github.com/repos/privacy-tech-lab/optmeowt-browser-extension | closed | New dev environment using Webpack to build Firefox & Chrome versions | architecture core functionality | This is the last big sensitive refactoring issue. Ideally, we will have one repo for both the Chrome and Firefox versions we will be developing. However, since the Firefox version will be diverging from Chrome in the near future, as well as for the sake of codebase simplicity, we need to find a way to abstract away the browser specifics from the code base and use some sort of javascript compiler and task runner to build the version of the extension we want during development.
One way to implement this is to have two separate `events.js` and `background.js` files, i.e., `firefox-events.js` / `chrome-events.js`, etc., and then have a task runner chose which files to build when we test/distribute. The other way I am thinking is to have a more "combined" repository, and use a task runner to fill in the browser we choose, i.e., have all the functions necessary for each browser together and then use $BROWSER or some other keyword in place of the browser name which the task runner will fill in. I'm leaning towards the first option, though we will still need to make sure we update both Chrome and Firefox versions for new functionality that should be included in both.
I will take a look at this once issue #178 is all set since we could use this implementation, ideally with a task runner and Babel/Webpack, in order to use better node libraries in place of what we use, as well as simplify our code base. | 1.0 | New dev environment using Webpack to build Firefox & Chrome versions - This is the last big sensitive refactoring issue. Ideally, we will have one repo for both the Chrome and Firefox versions we will be developing. However, since the Firefox version will be diverging from Chrome in the near future, as well as for the sake of codebase simplicity, we need to find a way to abstract away the browser specifics from the code base and use some sort of javascript compiler and task runner to build the version of the extension we want during development.
One way to implement this is to have two separate `events.js` and `background.js` files, i.e., `firefox-events.js` / `chrome-events.js`, etc., and then have a task runner chose which files to build when we test/distribute. The other way I am thinking is to have a more "combined" repository, and use a task runner to fill in the browser we choose, i.e., have all the functions necessary for each browser together and then use $BROWSER or some other keyword in place of the browser name which the task runner will fill in. I'm leaning towards the first option, though we will still need to make sure we update both Chrome and Firefox versions for new functionality that should be included in both.
I will take a look at this once issue #178 is all set since we could use this implementation, ideally with a task runner and Babel/Webpack, in order to use better node libraries in place of what we use, as well as simplify our code base. | non_priority | new dev environment using webpack to build firefox chrome versions this is the last big sensitive refactoring issue ideally we will have one repo for both the chrome and firefox versions we will be developing however since the firefox version will be diverging from chrome in the near future as well as for the sake of codebase simplicity we need to find a way to abstract away the browser specifics from the code base and use some sort of javascript compiler and task runner to build the version of the extension we want during development one way to implement this is to have two separate events js and background js files i e firefox events js chrome events js etc and then have a task runner chose which files to build when we test distribute the other way i am thinking is to have a more combined repository and use a task runner to fill in the browser we choose i e have all the functions necessary for each browser together and then use browser or some other keyword in place of the browser name which the task runner will fill in i m leaning towards the first option though we will still need to make sure we update both chrome and firefox versions for new functionality that should be included in both i will take a look at this once issue is all set since we could use this implementation ideally with a task runner and babel webpack in order to use better node libraries in place of what we use as well as simplify our code base | 0 |
22,094 | 18,668,954,968 | IssuesEvent | 2021-10-30 10:28:46 | AntennaPod/AntennaPod | https://api.github.com/repos/AntennaPod/AntennaPod | closed | 'Keep sorted' and 'Lock queue' interfere: hide latter when former is active | Type: Enhancement Area: Usability | # Checklist
<!-- Place an x in the boxes to tick them: [x] -->
- [x ] I have used the search function to see if someone else has already submitted the same feature request.
- [x ] I will only create one feature request per issue.
- [x ] I will describe the problem with as much detail as possible.
# System info
**App version**: 2.4.0-beta3
<!-- The latest version may be different depending on your device. You can find the version in AntennaPod's settings. -->
**App source**: Google Play
<!-- Please delete irrelevant answer or fill in the blank -->
# Feature description
**Problem you may be having, or feature you want**: When testing a debug build I got confused why don't have the drag handles in my main app, and why disabling 'lock queue' didn't make the drag handles appear. Until I realised that that was because I had 'keep sorted' active.
My confusion stems from the fact that the two settings interact: when 'Keep sorted' is active, half the effect of 'Queue lock' is gone.
Also swiping can be disabled and activated from 'Lock Queue' and from the swipe settings. One has to check two settings in order to understand why swiping is not possible.
<!-- Give a brief explanation about the problem that may currently exist -->
**Suggested solution**:
* [ ] Hide 'Lock queue' when 'Keep sorted' is active.
* [ ] Remove the effect of 'Lock queue' on the swipe settings.
Some users might be confused about why they don't see 'lock queue' anymore, but that would be only a specific group for whom that setting is hardly useful anyway (those who have 'Keep sorted' enabled).
For all users this will get rid of rather opaque interaction between different settings.
<!-- Describe how your requested feature solves this problem. Try to be as specific as possible. Please not only explain what the feature does, but also how. -->
**Screenshots / Drawings / Technical details**:
<!-- If your request is about (or includes) changing or extending the UI, describe what the UI would look like and how the user would interact with it. -->
| True | 'Keep sorted' and 'Lock queue' interfere: hide latter when former is active - # Checklist
<!-- Place an x in the boxes to tick them: [x] -->
- [x ] I have used the search function to see if someone else has already submitted the same feature request.
- [x ] I will only create one feature request per issue.
- [x ] I will describe the problem with as much detail as possible.
# System info
**App version**: 2.4.0-beta3
<!-- The latest version may be different depending on your device. You can find the version in AntennaPod's settings. -->
**App source**: Google Play
<!-- Please delete irrelevant answer or fill in the blank -->
# Feature description
**Problem you may be having, or feature you want**: When testing a debug build I got confused why don't have the drag handles in my main app, and why disabling 'lock queue' didn't make the drag handles appear. Until I realised that that was because I had 'keep sorted' active.
My confusion stems from the fact that the two settings interact: when 'Keep sorted' is active, half the effect of 'Queue lock' is gone.
Also swiping can be disabled and activated from 'Lock Queue' and from the swipe settings. One has to check two settings in order to understand why swiping is not possible.
<!-- Give a brief explanation about the problem that may currently exist -->
**Suggested solution**:
* [ ] Hide 'Lock queue' when 'Keep sorted' is active.
* [ ] Remove the effect of 'Lock queue' on the swipe settings.
Some users might be confused about why they don't see 'lock queue' anymore, but that would be only a specific group for whom that setting is hardly useful anyway (those who have 'Keep sorted' enabled).
For all users this will get rid of rather opaque interaction between different settings.
<!-- Describe how your requested feature solves this problem. Try to be as specific as possible. Please not only explain what the feature does, but also how. -->
**Screenshots / Drawings / Technical details**:
<!-- If your request is about (or includes) changing or extending the UI, describe what the UI would look like and how the user would interact with it. -->
| non_priority | keep sorted and lock queue interfere hide latter when former is active checklist i have used the search function to see if someone else has already submitted the same feature request i will only create one feature request per issue i will describe the problem with as much detail as possible system info app version app source google play feature description problem you may be having or feature you want when testing a debug build i got confused why don t have the drag handles in my main app and why disabling lock queue didn t make the drag handles appear until i realised that that was because i had keep sorted active my confusion stems from the fact that the two settings interact when keep sorted is active half the effect of queue lock is gone also swiping can be disabled and activated from lock queue and from the swipe settings one has to check two settings in order to understand why swiping is not possible suggested solution hide lock queue when keep sorted is active remove the effect of lock queue on the swipe settings some users might be confused about why they don t see lock queue anymore but that would be only a specific group for whom that setting is hardly useful anyway those who have keep sorted enabled for all users this will get rid of rather opaque interaction between different settings screenshots drawings technical details | 0 |
63,155 | 17,396,327,442 | IssuesEvent | 2021-08-02 13:53:54 | vector-im/element-web | https://api.github.com/repos/vector-im/element-web | closed | silently stops receiving new messages | P-low P3 S-Critical T-Defect | Riot seems to sometimes spontaneously stop receiving new messages. :(
Sending messages works, but they don't seem to come back down the sync.
I've sent a couple of rageshakes.
FF57.0b14 on Debian, using /develop | 1.0 | silently stops receiving new messages - Riot seems to sometimes spontaneously stop receiving new messages. :(
Sending messages works, but they don't seem to come back down the sync.
I've sent a couple of rageshakes.
FF57.0b14 on Debian, using /develop | non_priority | silently stops receiving new messages riot seems to sometimes spontaneously stop receiving new messages sending messages works but they don t seem to come back down the sync i ve sent a couple of rageshakes on debian using develop | 0 |
176,118 | 21,366,963,767 | IssuesEvent | 2022-04-20 03:28:58 | jitrapon/glom-android | https://api.github.com/repos/jitrapon/glom-android | opened | CVE-2021-35515 (High) detected in commons-compress-1.12.jar | security vulnerability | ## CVE-2021-35515 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-compress-1.12.jar</b></p></summary>
<p>Apache Commons Compress software defines an API for working with
compression and archive formats. These include: bzip2, gzip, pack200,
lzma, xz, Snappy, traditional Unix Compress, DEFLATE and ar, cpio,
jar, tar, zip, dump, 7z, arj.</p>
<p>Path to dependency file: /auth/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar</p>
<p>
Dependency Hierarchy:
- lint-gradle-26.5.1.jar (Root Library)
- builder-3.5.1.jar
- sdklib-26.5.1.jar
- :x: **commons-compress-1.12.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/jitrapon/glom-android/commit/fe568e5752e24693f6826e5ecd7694b4a426cb26">fe568e5752e24693f6826e5ecd7694b4a426cb26</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.
<p>Publish Date: 2021-07-13
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35515>CVE-2021-35515</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://commons.apache.org/proper/commons-compress/security-reports.html">https://commons.apache.org/proper/commons-compress/security-reports.html</a></p>
<p>Release Date: 2021-07-13</p>
<p>Fix Resolution: org.apache.commons:commons-compress:1.21</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-35515 (High) detected in commons-compress-1.12.jar - ## CVE-2021-35515 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-compress-1.12.jar</b></p></summary>
<p>Apache Commons Compress software defines an API for working with
compression and archive formats. These include: bzip2, gzip, pack200,
lzma, xz, Snappy, traditional Unix Compress, DEFLATE and ar, cpio,
jar, tar, zip, dump, 7z, arj.</p>
<p>Path to dependency file: /auth/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar</p>
<p>
Dependency Hierarchy:
- lint-gradle-26.5.1.jar (Root Library)
- builder-3.5.1.jar
- sdklib-26.5.1.jar
- :x: **commons-compress-1.12.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/jitrapon/glom-android/commit/fe568e5752e24693f6826e5ecd7694b4a426cb26">fe568e5752e24693f6826e5ecd7694b4a426cb26</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.
<p>Publish Date: 2021-07-13
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-35515>CVE-2021-35515</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://commons.apache.org/proper/commons-compress/security-reports.html">https://commons.apache.org/proper/commons-compress/security-reports.html</a></p>
<p>Release Date: 2021-07-13</p>
<p>Fix Resolution: org.apache.commons:commons-compress:1.21</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in commons compress jar cve high severity vulnerability vulnerable library commons compress jar apache commons compress software defines an api for working with compression and archive formats these include gzip lzma xz snappy traditional unix compress deflate and ar cpio jar tar zip dump arj path to dependency file auth build gradle path to vulnerable library home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar home wss scanner gradle caches modules files org apache commons commons compress commons compress jar dependency hierarchy lint gradle jar root library builder jar sdklib jar x commons compress jar vulnerable library found in head commit a href found in base branch develop vulnerability details when reading a specially crafted archive the construction of the list of codecs that decompress an entry can result in an infinite loop this could be used to mount a denial of service attack against services that use compress sevenz package publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache commons commons compress step up your open source security game with whitesource | 0 |
86,931 | 17,106,078,444 | IssuesEvent | 2021-07-09 17:58:09 | dotnet/runtime | https://api.github.com/repos/dotnet/runtime | closed | Potential performance regression in the `*IterateForEach*Span*` benchmarks | amd-perf arch-arm64 area-CodeGen-coreclr tenet-performance untriaged | While doing the .NET 5 vs .NET 6 preview 7 manual perf run I've found something that seems to be ARM64, ARM and AMD (x64) specific regression.
Repro:
```cmd
py .\scripts\benchmarks_ci.py -f net5.0 net6.0 --filter "System.Collections.IterateForEach<int32>.ReadOnlySpan" --bdn-arguments "--disasm true --memoryRandomization true"
```
Results from multiple machines:
<details>
## System.Collections.IterateForEach<String>.ReadOnlySpan(Size: 512)
| Result | Base | Diff | Ratio | Alloc Delta | Modality | Operating System | Bit | Processor Name | Base V | Diff V |
| ------ | ------:| -------:| -----:| -----------:| -------- | ----------------------- | ----- | --------------------------------------------- | ------------- | ------------ |
| Slower | 125.03 | 1103.94 | 0.11 | +0 | | Windows 10.0.19041.1052 | X64 | AMD Ryzen Threadripper PRO 3945WX 12-Cores | 5.0.721.25508 | 6.0.21.35216|
| Same | 216.85 | 219.31 | 0.99 | +0 | | Windows 10.0.18363.1621 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 241.37 | 241.29 | 1.00 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i5-8500 CPU 3.00GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802|
| Same | 241.67 | 242.53 | 1.00 | +0 | | Windows 10.0.19042.685 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 279.40 | 284.73 | 0.98 | +0 | bimodal | Windows 10.0.19043.1052 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32802|
| Same | 320.13 | 311.72 | 1.03 | +0 | several? | Windows 10.0.22000 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32901|
| Slower | 189.81 | 215.37 | 0.88 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8700 CPU 3.20GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802|
| Same | 407.89 | 394.83 | 1.03 | +0 | | Windows 7 SP1 | X64 | Intel Core2 Duo CPU T9600 2.80GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 204.40 | 200.56 | 1.02 | +0 | | ubuntu 18.04 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 403.53 | 5274.27 | 0.08 | +0 | | ubuntu 16.04 | Arm64 | Unknown processor | 5.0.721.25508 | 6.0.21.35701|
| Same | 352.76 | 352.49 | 1.00 | +0 | | Windows 10.0.19043.1052 | Arm64 | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 140.73 | 139.72 | 1.01 | +0 | | Windows 10.0.18363.1621 | X86 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 329.66 | 1394.41 | 0.24 | +0 | | Windows 10.0.19043.1052 | Arm | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.35216|
| Same | 331.44 | 330.27 | 1.00 | +0 | | macOS Big Sur 11.3.1 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 323.04 | 322.33 | 1.00 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 239.51 | 238.36 | 1.00 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901|
## System.Collections.IterateForEach<Int32>.ReadOnlySpan(Size: 512)
| Result | Base | Diff | Ratio | Alloc Delta | Modality | Operating System | Bit | Processor Name | Base V | Diff V |
| ------ | ------:| -------:| -----:| -----------:| --------:| ----------------------- | ----- | --------------------------------------------- | ------------- | ------------ |
| Slower | 123.26 | 1108.25 | 0.11 | +0 | | Windows 10.0.19041.1052 | X64 | AMD Ryzen Threadripper PRO 3945WX 12-Cores | 5.0.721.25508 | 6.0.21.35216|
| Same | 208.98 | 203.03 | 1.03 | +0 | | Windows 10.0.18363.1621 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 166.68 | 160.38 | 1.04 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i5-8500 CPU 3.00GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802|
| Same | 233.36 | 229.13 | 1.02 | +0 | | Windows 10.0.19042.685 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901|
| Slower | 250.30 | 282.27 | 0.89 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32802|
| Slower | 251.59 | 285.56 | 0.88 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32901|
| Same | 192.04 | 213.50 | 0.90 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8700 CPU 3.20GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802|
| Same | 403.58 | 405.14 | 1.00 | +0 | | Windows 7 SP1 | X64 | Intel Core2 Duo CPU T9600 2.80GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 196.03 | 199.04 | 0.98 | +0 | | ubuntu 18.04 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 395.46 | 4943.41 | 0.08 | +0 | | ubuntu 16.04 | Arm64 | Unknown processor | 5.0.721.25508 | 6.0.21.35701|
| Same | 346.01 | 332.33 | 1.04 | +0 | | Windows 10.0.19043.1052 | Arm64 | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 143.67 | 143.86 | 1.00 | +0 | | Windows 10.0.18363.1621 | X86 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 346.26 | 1362.83 | 0.25 | +0 | | Windows 10.0.19043.1052 | Arm | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.35216|
| Same | 326.15 | 324.09 | 1.01 | +0 | | macOS Big Sur 11.3.1 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 318.47 | 315.87 | 1.01 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 230.46 | 228.78 | 1.01 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901|
## System.Collections.IterateForEach<String>.Span(Size: 512)
| Result | Base | Diff | Ratio | Alloc Delta | Modality | Operating System | Bit | Processor Name | Base V | Diff V |
| ------ | ------:| -------:| -----:| -----------:| --------:| ----------------------- | ----- | --------------------------------------------- | ------------- | ------------ |
| Slower | 127.87 | 1111.12 | 0.12 | +0 | | Windows 10.0.19041.1052 | X64 | AMD Ryzen Threadripper PRO 3945WX 12-Cores | 5.0.721.25508 | 6.0.21.35216|
| Same | 216.69 | 210.35 | 1.03 | +0 | | Windows 10.0.18363.1621 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 186.30 | 241.93 | 0.77 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i5-8500 CPU 3.00GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802|
| Same | 241.10 | 234.05 | 1.03 | +0 | | Windows 10.0.19042.685 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 275.56 | 269.14 | 1.02 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32802|
| Faster | 299.24 | 190.93 | 1.57 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32901|
| Slower | 183.80 | 207.79 | 0.88 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8700 CPU 3.20GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802|
| Same | 410.40 | 405.76 | 1.01 | +0 | | Windows 7 SP1 | X64 | Intel Core2 Duo CPU T9600 2.80GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 207.41 | 206.67 | 1.00 | +0 | | ubuntu 18.04 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 418.07 | 5286.05 | 0.08 | +0 | | ubuntu 16.04 | Arm64 | Unknown processor | 5.0.721.25508 | 6.0.21.35701|
| Same | 339.92 | 360.51 | 0.94 | +0 | | Windows 10.0.19043.1052 | Arm64 | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 151.40 | 150.49 | 1.01 | +0 | | Windows 10.0.18363.1621 | X86 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 332.07 | 1380.42 | 0.24 | +0 | | Windows 10.0.19043.1052 | Arm | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.35216|
| Same | 335.51 | 334.64 | 1.00 | +0 | | macOS Big Sur 11.3.1 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 327.04 | 327.25 | 1.00 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 241.14 | 240.91 | 1.00 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901|
## System.Collections.IterateForEach<Int32>.Span(Size: 512)
| Result | Base | Diff | Ratio | Alloc Delta | Modality | Operating System | Bit | Processor Name | Base V | Diff V |
| ------ | ------:| -------:| -----:| -----------:| -------- | ----------------------- | ----- | --------------------------------------------- | ------------- | ------------ |
| Slower | 123.08 | 1109.80 | 0.11 | +0 | | Windows 10.0.19041.1052 | X64 | AMD Ryzen Threadripper PRO 3945WX 12-Cores | 5.0.721.25508 | 6.0.21.35216|
| Same | 208.99 | 202.05 | 1.03 | +0 | | Windows 10.0.18363.1621 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 168.16 | 159.26 | 1.06 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i5-8500 CPU 3.00GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802|
| Same | 233.38 | 229.84 | 1.02 | +0 | | Windows 10.0.19042.685 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 252.07 | 283.22 | 0.89 | +0 | bimodal | Windows 10.0.19043.1052 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32802|
| Slower | 246.32 | 283.00 | 0.87 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32901|
| Same | 209.99 | 212.25 | 0.99 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8700 CPU 3.20GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802|
| Same | 403.82 | 405.26 | 1.00 | +0 | | Windows 7 SP1 | X64 | Intel Core2 Duo CPU T9600 2.80GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 196.18 | 199.00 | 0.99 | +0 | | ubuntu 18.04 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 395.45 | 5200.84 | 0.08 | +0 | | ubuntu 16.04 | Arm64 | Unknown processor | 5.0.721.25508 | 6.0.21.35701|
| Same | 332.26 | 345.87 | 0.96 | +0 | | Windows 10.0.19043.1052 | Arm64 | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 143.98 | 143.81 | 1.00 | +0 | | Windows 10.0.18363.1621 | X86 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 346.31 | 1363.60 | 0.25 | +0 | | Windows 10.0.19043.1052 | Arm | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.35216|
| Same | 326.52 | 323.78 | 1.01 | +0 | | macOS Big Sur 11.3.1 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 318.34 | 315.92 | 1.01 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 230.54 | 228.77 | 1.01 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901|
</details>
Disassembly from my AMD machine:
<details>
## .NET 5.0.7 (5.0.721.25508), X64 RyuJIT
```assembly
; System.Collections.IterateForEach`1[[System.Int32, System.Private.CoreLib]].ReadOnlySpan()
xor eax,eax
mov rdx,[rcx+8]
test rdx,rdx
jne short M00_L00
xor ecx,ecx
xor r8d,r8d
jmp short M00_L01
M00_L00:
lea rcx,[rdx+10]
mov r8d,[rdx+8]
M00_L01:
xor edx,edx
test r8d,r8d
jle short M00_L03
M00_L02:
movsxd rax,edx
mov eax,[rcx+rax*4]
inc edx
cmp edx,r8d
jl short M00_L02
M00_L03:
ret
; Total bytes of code 47
```
## .NET 6.0.0 (6.0.21.35701), X64 RyuJIT
```assembly
; System.Collections.IterateForEach`1[[System.Int32, System.Private.CoreLib]].ReadOnlySpan()
sub rsp,58
vzeroupper
vxorps xmm4,xmm4,xmm4
vmovdqa xmmword ptr [rsp+30],xmm4
vmovdqa xmmword ptr [rsp+40],xmm4
xor eax,eax
mov [rsp+54],eax
mov rax,[rcx+8]
test rax,rax
jne short M00_L00
vxorps xmm0,xmm0,xmm0
vmovdqu xmmword ptr [rsp+40],xmm0
jmp short M00_L01
M00_L00:
lea rdx,[rax+10]
mov [rsp+40],rdx
mov eax,[rax+8]
mov [rsp+48],eax
M00_L01:
mov rax,[rsp+40]
mov [rsp+30],rax
mov eax,[rsp+48]
mov [rsp+38],eax
xor eax,eax
mov [rsp+2C],eax
cmp dword ptr [rsp+38],0
jle short M00_L03
M00_L02:
mov eax,[rsp+38]
cmp [rsp+2C],eax
jae short M00_L04
mov rax,[rsp+30]
mov edx,[rsp+2C]
movsxd rdx,edx
mov eax,[rax+rdx*4]
mov [rsp+28],eax
mov eax,[rsp+28]
mov [rsp+54],eax
mov eax,[rsp+2C]
inc eax
mov [rsp+2C],eax
mov eax,[rsp+2C]
cmp eax,[rsp+38]
jl short M00_L02
M00_L03:
mov eax,[rsp+54]
add rsp,58
ret
M00_L04:
call CORINFO_HELP_RNGCHKFAIL
int 3
; Total bytes of code 169
```
</details>
cc @kunalspathak @AndyAyersMS @DrewScoggins | 1.0 | Potential performance regression in the `*IterateForEach*Span*` benchmarks - While doing the .NET 5 vs .NET 6 preview 7 manual perf run I've found something that seems to be ARM64, ARM and AMD (x64) specific regression.
Repro:
```cmd
py .\scripts\benchmarks_ci.py -f net5.0 net6.0 --filter "System.Collections.IterateForEach<int32>.ReadOnlySpan" --bdn-arguments "--disasm true --memoryRandomization true"
```
Results from multiple machines:
<details>
## System.Collections.IterateForEach<String>.ReadOnlySpan(Size: 512)
| Result | Base | Diff | Ratio | Alloc Delta | Modality | Operating System | Bit | Processor Name | Base V | Diff V |
| ------ | ------:| -------:| -----:| -----------:| -------- | ----------------------- | ----- | --------------------------------------------- | ------------- | ------------ |
| Slower | 125.03 | 1103.94 | 0.11 | +0 | | Windows 10.0.19041.1052 | X64 | AMD Ryzen Threadripper PRO 3945WX 12-Cores | 5.0.721.25508 | 6.0.21.35216|
| Same | 216.85 | 219.31 | 0.99 | +0 | | Windows 10.0.18363.1621 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 241.37 | 241.29 | 1.00 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i5-8500 CPU 3.00GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802|
| Same | 241.67 | 242.53 | 1.00 | +0 | | Windows 10.0.19042.685 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 279.40 | 284.73 | 0.98 | +0 | bimodal | Windows 10.0.19043.1052 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32802|
| Same | 320.13 | 311.72 | 1.03 | +0 | several? | Windows 10.0.22000 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32901|
| Slower | 189.81 | 215.37 | 0.88 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8700 CPU 3.20GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802|
| Same | 407.89 | 394.83 | 1.03 | +0 | | Windows 7 SP1 | X64 | Intel Core2 Duo CPU T9600 2.80GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 204.40 | 200.56 | 1.02 | +0 | | ubuntu 18.04 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 403.53 | 5274.27 | 0.08 | +0 | | ubuntu 16.04 | Arm64 | Unknown processor | 5.0.721.25508 | 6.0.21.35701|
| Same | 352.76 | 352.49 | 1.00 | +0 | | Windows 10.0.19043.1052 | Arm64 | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 140.73 | 139.72 | 1.01 | +0 | | Windows 10.0.18363.1621 | X86 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 329.66 | 1394.41 | 0.24 | +0 | | Windows 10.0.19043.1052 | Arm | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.35216|
| Same | 331.44 | 330.27 | 1.00 | +0 | | macOS Big Sur 11.3.1 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 323.04 | 322.33 | 1.00 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 239.51 | 238.36 | 1.00 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901|
## System.Collections.IterateForEach<Int32>.ReadOnlySpan(Size: 512)
| Result | Base | Diff | Ratio | Alloc Delta | Modality | Operating System | Bit | Processor Name | Base V | Diff V |
| ------ | ------:| -------:| -----:| -----------:| --------:| ----------------------- | ----- | --------------------------------------------- | ------------- | ------------ |
| Slower | 123.26 | 1108.25 | 0.11 | +0 | | Windows 10.0.19041.1052 | X64 | AMD Ryzen Threadripper PRO 3945WX 12-Cores | 5.0.721.25508 | 6.0.21.35216|
| Same | 208.98 | 203.03 | 1.03 | +0 | | Windows 10.0.18363.1621 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 166.68 | 160.38 | 1.04 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i5-8500 CPU 3.00GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802|
| Same | 233.36 | 229.13 | 1.02 | +0 | | Windows 10.0.19042.685 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901|
| Slower | 250.30 | 282.27 | 0.89 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32802|
| Slower | 251.59 | 285.56 | 0.88 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32901|
| Same | 192.04 | 213.50 | 0.90 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8700 CPU 3.20GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802|
| Same | 403.58 | 405.14 | 1.00 | +0 | | Windows 7 SP1 | X64 | Intel Core2 Duo CPU T9600 2.80GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 196.03 | 199.04 | 0.98 | +0 | | ubuntu 18.04 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 395.46 | 4943.41 | 0.08 | +0 | | ubuntu 16.04 | Arm64 | Unknown processor | 5.0.721.25508 | 6.0.21.35701|
| Same | 346.01 | 332.33 | 1.04 | +0 | | Windows 10.0.19043.1052 | Arm64 | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 143.67 | 143.86 | 1.00 | +0 | | Windows 10.0.18363.1621 | X86 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 346.26 | 1362.83 | 0.25 | +0 | | Windows 10.0.19043.1052 | Arm | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.35216|
| Same | 326.15 | 324.09 | 1.01 | +0 | | macOS Big Sur 11.3.1 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 318.47 | 315.87 | 1.01 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 230.46 | 228.78 | 1.01 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901|
## System.Collections.IterateForEach<String>.Span(Size: 512)
| Result | Base | Diff | Ratio | Alloc Delta | Modality | Operating System | Bit | Processor Name | Base V | Diff V |
| ------ | ------:| -------:| -----:| -----------:| --------:| ----------------------- | ----- | --------------------------------------------- | ------------- | ------------ |
| Slower | 127.87 | 1111.12 | 0.12 | +0 | | Windows 10.0.19041.1052 | X64 | AMD Ryzen Threadripper PRO 3945WX 12-Cores | 5.0.721.25508 | 6.0.21.35216|
| Same | 216.69 | 210.35 | 1.03 | +0 | | Windows 10.0.18363.1621 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 186.30 | 241.93 | 0.77 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i5-8500 CPU 3.00GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802|
| Same | 241.10 | 234.05 | 1.03 | +0 | | Windows 10.0.19042.685 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 275.56 | 269.14 | 1.02 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32802|
| Faster | 299.24 | 190.93 | 1.57 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32901|
| Slower | 183.80 | 207.79 | 0.88 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8700 CPU 3.20GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802|
| Same | 410.40 | 405.76 | 1.01 | +0 | | Windows 7 SP1 | X64 | Intel Core2 Duo CPU T9600 2.80GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 207.41 | 206.67 | 1.00 | +0 | | ubuntu 18.04 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 418.07 | 5286.05 | 0.08 | +0 | | ubuntu 16.04 | Arm64 | Unknown processor | 5.0.721.25508 | 6.0.21.35701|
| Same | 339.92 | 360.51 | 0.94 | +0 | | Windows 10.0.19043.1052 | Arm64 | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 151.40 | 150.49 | 1.01 | +0 | | Windows 10.0.18363.1621 | X86 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 332.07 | 1380.42 | 0.24 | +0 | | Windows 10.0.19043.1052 | Arm | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.35216|
| Same | 335.51 | 334.64 | 1.00 | +0 | | macOS Big Sur 11.3.1 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 327.04 | 327.25 | 1.00 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 241.14 | 240.91 | 1.00 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901|
## System.Collections.IterateForEach<Int32>.Span(Size: 512)
| Result | Base | Diff | Ratio | Alloc Delta | Modality | Operating System | Bit | Processor Name | Base V | Diff V |
| ------ | ------:| -------:| -----:| -----------:| -------- | ----------------------- | ----- | --------------------------------------------- | ------------- | ------------ |
| Slower | 123.08 | 1109.80 | 0.11 | +0 | | Windows 10.0.19041.1052 | X64 | AMD Ryzen Threadripper PRO 3945WX 12-Cores | 5.0.721.25508 | 6.0.21.35216|
| Same | 208.99 | 202.05 | 1.03 | +0 | | Windows 10.0.18363.1621 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 168.16 | 159.26 | 1.06 | +0 | | Windows 10.0.19043.1052 | X64 | Intel Core i5-8500 CPU 3.00GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802|
| Same | 233.38 | 229.84 | 1.02 | +0 | | Windows 10.0.19042.685 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 252.07 | 283.22 | 0.89 | +0 | bimodal | Windows 10.0.19043.1052 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32802|
| Slower | 246.32 | 283.00 | 0.87 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8650U CPU 1.90GHz (Kaby Lake R) | 5.0.721.25508 | 6.0.21.32901|
| Same | 209.99 | 212.25 | 0.99 | +0 | | Windows 10.0.22000 | X64 | Intel Core i7-8700 CPU 3.20GHz (Coffee Lake) | 5.0.721.25508 | 6.0.21.32802|
| Same | 403.82 | 405.26 | 1.00 | +0 | | Windows 7 SP1 | X64 | Intel Core2 Duo CPU T9600 2.80GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 196.18 | 199.00 | 0.99 | +0 | | ubuntu 18.04 | X64 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 395.45 | 5200.84 | 0.08 | +0 | | ubuntu 16.04 | Arm64 | Unknown processor | 5.0.721.25508 | 6.0.21.35701|
| Same | 332.26 | 345.87 | 0.96 | +0 | | Windows 10.0.19043.1052 | Arm64 | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.32901|
| Same | 143.98 | 143.81 | 1.00 | +0 | | Windows 10.0.18363.1621 | X86 | Intel Xeon CPU E5-1650 v4 3.60GHz | 5.0.721.25508 | 6.0.21.32901|
| Slower | 346.31 | 1363.60 | 0.25 | +0 | | Windows 10.0.19043.1052 | Arm | Microsoft SQ1 3.0 GHz | 5.0.721.25508 | 6.0.21.35216|
| Same | 326.52 | 323.78 | 1.01 | +0 | | macOS Big Sur 11.3.1 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 318.34 | 315.92 | 1.01 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i5-4278U CPU 2.60GHz (Haswell) | 5.0.721.25508 | 6.0.21.32901|
| Same | 230.54 | 228.77 | 1.01 | +0 | | macOS Big Sur 11.4 | X64 | Intel Core i7-5557U CPU 3.10GHz (Broadwell) | 5.0.721.25508 | 6.0.21.32901|
</details>
Disassembly from my AMD machine:
<details>
## .NET 5.0.7 (5.0.721.25508), X64 RyuJIT
```assembly
; System.Collections.IterateForEach`1[[System.Int32, System.Private.CoreLib]].ReadOnlySpan()
xor eax,eax
mov rdx,[rcx+8]
test rdx,rdx
jne short M00_L00
xor ecx,ecx
xor r8d,r8d
jmp short M00_L01
M00_L00:
lea rcx,[rdx+10]
mov r8d,[rdx+8]
M00_L01:
xor edx,edx
test r8d,r8d
jle short M00_L03
M00_L02:
movsxd rax,edx
mov eax,[rcx+rax*4]
inc edx
cmp edx,r8d
jl short M00_L02
M00_L03:
ret
; Total bytes of code 47
```
## .NET 6.0.0 (6.0.21.35701), X64 RyuJIT
```assembly
; System.Collections.IterateForEach`1[[System.Int32, System.Private.CoreLib]].ReadOnlySpan()
sub rsp,58
vzeroupper
vxorps xmm4,xmm4,xmm4
vmovdqa xmmword ptr [rsp+30],xmm4
vmovdqa xmmword ptr [rsp+40],xmm4
xor eax,eax
mov [rsp+54],eax
mov rax,[rcx+8]
test rax,rax
jne short M00_L00
vxorps xmm0,xmm0,xmm0
vmovdqu xmmword ptr [rsp+40],xmm0
jmp short M00_L01
M00_L00:
lea rdx,[rax+10]
mov [rsp+40],rdx
mov eax,[rax+8]
mov [rsp+48],eax
M00_L01:
mov rax,[rsp+40]
mov [rsp+30],rax
mov eax,[rsp+48]
mov [rsp+38],eax
xor eax,eax
mov [rsp+2C],eax
cmp dword ptr [rsp+38],0
jle short M00_L03
M00_L02:
mov eax,[rsp+38]
cmp [rsp+2C],eax
jae short M00_L04
mov rax,[rsp+30]
mov edx,[rsp+2C]
movsxd rdx,edx
mov eax,[rax+rdx*4]
mov [rsp+28],eax
mov eax,[rsp+28]
mov [rsp+54],eax
mov eax,[rsp+2C]
inc eax
mov [rsp+2C],eax
mov eax,[rsp+2C]
cmp eax,[rsp+38]
jl short M00_L02
M00_L03:
mov eax,[rsp+54]
add rsp,58
ret
M00_L04:
call CORINFO_HELP_RNGCHKFAIL
int 3
; Total bytes of code 169
```
</details>
cc @kunalspathak @AndyAyersMS @DrewScoggins | non_priority | potential performance regression in the iterateforeach span benchmarks while doing the net vs net preview manual perf run i ve found something that seems to be arm and amd specific regression repro cmd py scripts benchmarks ci py f filter system collections iterateforeach readonlyspan bdn arguments disasm true memoryrandomization true results from multiple machines system collections iterateforeach readonlyspan size result base diff ratio alloc delta modality operating system bit processor name base v diff v slower windows amd ryzen threadripper pro cores same windows intel xeon cpu same windows intel core cpu coffee lake same windows intel core cpu broadwell same bimodal windows intel core cpu kaby lake r same several windows intel core cpu kaby lake r slower windows intel core cpu coffee lake same windows intel duo cpu same ubuntu intel xeon cpu slower ubuntu unknown processor same windows microsoft ghz same windows intel xeon cpu slower windows arm microsoft ghz same macos big sur intel core cpu haswell same macos big sur intel core cpu haswell same macos big sur intel core cpu broadwell system collections iterateforeach readonlyspan size result base diff ratio alloc delta modality operating system bit processor name base v diff v slower windows amd ryzen threadripper pro cores same windows intel xeon cpu same windows intel core cpu coffee lake same windows intel core cpu broadwell slower windows intel core cpu kaby lake r slower windows intel core cpu kaby lake r same windows intel core cpu coffee lake same windows intel duo cpu same ubuntu intel xeon cpu slower ubuntu unknown processor same windows microsoft ghz same windows intel xeon cpu slower windows arm microsoft ghz same macos big sur intel core cpu haswell same macos big sur intel core cpu haswell same macos big sur intel core cpu broadwell system collections iterateforeach span size result base diff ratio alloc delta modality operating system bit processor name base v diff v slower windows amd ryzen threadripper pro cores same windows intel xeon cpu slower windows intel core cpu coffee lake same windows intel core cpu broadwell same windows intel core cpu kaby lake r faster windows intel core cpu kaby lake r slower windows intel core cpu coffee lake same windows intel duo cpu same ubuntu intel xeon cpu slower ubuntu unknown processor same windows microsoft ghz same windows intel xeon cpu slower windows arm microsoft ghz same macos big sur intel core cpu haswell same macos big sur intel core cpu haswell same macos big sur intel core cpu broadwell system collections iterateforeach span size result base diff ratio alloc delta modality operating system bit processor name base v diff v slower windows amd ryzen threadripper pro cores same windows intel xeon cpu same windows intel core cpu coffee lake same windows intel core cpu broadwell same bimodal windows intel core cpu kaby lake r slower windows intel core cpu kaby lake r same windows intel core cpu coffee lake same windows intel duo cpu same ubuntu intel xeon cpu slower ubuntu unknown processor same windows microsoft ghz same windows intel xeon cpu slower windows arm microsoft ghz same macos big sur intel core cpu haswell same macos big sur intel core cpu haswell same macos big sur intel core cpu broadwell disassembly from my amd machine net ryujit assembly system collections iterateforeach readonlyspan xor eax eax mov rdx test rdx rdx jne short xor ecx ecx xor jmp short lea rcx mov xor edx edx test jle short movsxd rax edx mov eax inc edx cmp edx jl short ret total bytes of code net ryujit assembly system collections iterateforeach readonlyspan sub rsp vzeroupper vxorps vmovdqa xmmword ptr vmovdqa xmmword ptr xor eax eax mov eax mov rax test rax rax jne short vxorps vmovdqu xmmword ptr jmp short lea rdx mov rdx mov eax mov eax mov rax mov rax mov eax mov eax xor eax eax mov eax cmp dword ptr jle short mov eax cmp eax jae short mov rax mov edx movsxd rdx edx mov eax mov eax mov eax mov eax mov eax inc eax mov eax mov eax cmp eax jl short mov eax add rsp ret call corinfo help rngchkfail int total bytes of code cc kunalspathak andyayersms drewscoggins | 0 |
161,774 | 25,399,225,989 | IssuesEvent | 2022-11-22 10:49:18 | team113/messenger | https://api.github.com/repos/team113/messenger | opened | Pagination | enhancement k::design k::refactor | ## Background
У любого списка должна быть пагинация.
## Problem to solve
На данный момент список контактов, чатов и сообщений прогружает N элементов без возможности что-то догружать. Нужна пагинация.
## Possible solutions
Исследовать каким образом можно удобно и универсально реализовать механизм пагинации элементов. При скролле вверх/вниз того или иного списка должны догружаться элементы - список чатов, список контактов и список сообщений.
| 1.0 | Pagination - ## Background
У любого списка должна быть пагинация.
## Problem to solve
На данный момент список контактов, чатов и сообщений прогружает N элементов без возможности что-то догружать. Нужна пагинация.
## Possible solutions
Исследовать каким образом можно удобно и универсально реализовать механизм пагинации элементов. При скролле вверх/вниз того или иного списка должны догружаться элементы - список чатов, список контактов и список сообщений.
| non_priority | pagination background у любого списка должна быть пагинация problem to solve на данный момент список контактов чатов и сообщений прогружает n элементов без возможности что то догружать нужна пагинация possible solutions исследовать каким образом можно удобно и универсально реализовать механизм пагинации элементов при скролле вверх вниз того или иного списка должны догружаться элементы список чатов список контактов и список сообщений | 0 |
85,545 | 15,755,010,487 | IssuesEvent | 2021-03-31 01:01:25 | yaeljacobs67/fs-agent | https://api.github.com/repos/yaeljacobs67/fs-agent | opened | CVE-2021-23358 (High) detected in underscore-1.9.1.tgz | security vulnerability | ## CVE-2021-23358 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>underscore-1.9.1.tgz</b></p></summary>
<p>JavaScript's functional programming helper library.</p>
<p>Library home page: <a href="https://registry.npmjs.org/underscore/-/underscore-1.9.1.tgz">https://registry.npmjs.org/underscore/-/underscore-1.9.1.tgz</a></p>
<p>Path to dependency file: /fs-agent/test_input/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/package.json</p>
<p>Path to vulnerable library: fs-agent/test_input/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/node_modules/underscore/package.json</p>
<p>
Dependency Hierarchy:
- recess-1.0.3.tgz (Root Library)
- :x: **underscore-1.9.1.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized.
<p>Publish Date: 2021-03-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23358>CVE-2021-23358</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358</a></p>
<p>Release Date: 2021-03-29</p>
<p>Fix Resolution: underscore - 1.12.1,1.13.0-2</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"underscore","packageVersion":"1.9.1","packageFilePaths":["/fs-agent/test_input/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/package.json"],"isTransitiveDependency":true,"dependencyTree":"recess:1.0.3;underscore:1.9.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"underscore - 1.12.1,1.13.0-2"}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2021-23358","vulnerabilityDetails":"The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23358","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2021-23358 (High) detected in underscore-1.9.1.tgz - ## CVE-2021-23358 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>underscore-1.9.1.tgz</b></p></summary>
<p>JavaScript's functional programming helper library.</p>
<p>Library home page: <a href="https://registry.npmjs.org/underscore/-/underscore-1.9.1.tgz">https://registry.npmjs.org/underscore/-/underscore-1.9.1.tgz</a></p>
<p>Path to dependency file: /fs-agent/test_input/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/package.json</p>
<p>Path to vulnerable library: fs-agent/test_input/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/node_modules/underscore/package.json</p>
<p>
Dependency Hierarchy:
- recess-1.0.3.tgz (Root Library)
- :x: **underscore-1.9.1.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized.
<p>Publish Date: 2021-03-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23358>CVE-2021-23358</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358</a></p>
<p>Release Date: 2021-03-29</p>
<p>Fix Resolution: underscore - 1.12.1,1.13.0-2</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"underscore","packageVersion":"1.9.1","packageFilePaths":["/fs-agent/test_input/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/package.json"],"isTransitiveDependency":true,"dependencyTree":"recess:1.0.3;underscore:1.9.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"underscore - 1.12.1,1.13.0-2"}],"baseBranches":[],"vulnerabilityIdentifier":"CVE-2021-23358","vulnerabilityDetails":"The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23358","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in underscore tgz cve high severity vulnerability vulnerable library underscore tgz javascript s functional programming helper library library home page a href path to dependency file fs agent test input ksa ksa web root ksa web src main webapp rs bootstrap package json path to vulnerable library fs agent test input ksa ksa web root ksa web src main webapp rs bootstrap node modules underscore package json dependency hierarchy recess tgz root library x underscore tgz vulnerable library vulnerability details the package underscore from and before from and before are vulnerable to arbitrary code execution via the template function particularly when a variable property is passed as an argument as it is not sanitized publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution underscore isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree recess underscore isminimumfixversionavailable true minimumfixversion underscore basebranches vulnerabilityidentifier cve vulnerabilitydetails the package underscore from and before from and before are vulnerable to arbitrary code execution via the template function particularly when a variable property is passed as an argument as it is not sanitized vulnerabilityurl | 0 |
1,720 | 3,353,328,447 | IssuesEvent | 2015-11-18 04:53:13 | elmsln/elmsln | https://api.github.com/repos/elmsln/elmsln | closed | rm-site.sh changes | drush related enhancement infrastructure | - [x] backup site db w/ drush before killing
- [x] back up config before killing
- [ ] try to auto target and remove the lines from the sites.php file
- [ ] remove all the confirmation and make it initial confirms, this was built by a sys admin so it asks too many questions that would need to be understood to keep a human employed. | 1.0 | rm-site.sh changes - - [x] backup site db w/ drush before killing
- [x] back up config before killing
- [ ] try to auto target and remove the lines from the sites.php file
- [ ] remove all the confirmation and make it initial confirms, this was built by a sys admin so it asks too many questions that would need to be understood to keep a human employed. | non_priority | rm site sh changes backup site db w drush before killing back up config before killing try to auto target and remove the lines from the sites php file remove all the confirmation and make it initial confirms this was built by a sys admin so it asks too many questions that would need to be understood to keep a human employed | 0 |
109,456 | 16,845,821,053 | IssuesEvent | 2021-06-19 13:09:01 | mukul-seagate11/cortx-s3server | https://api.github.com/repos/mukul-seagate11/cortx-s3server | closed | CVE-2018-19362 (High) detected in jackson-databind-2.6.6.jar | security vulnerability | ## CVE-2018-19362 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.6.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: cortx-s3server/auth-utils/jclient/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.6/jackson-databind-2.6.6.jar</p>
<p>
Dependency Hierarchy:
- aws-java-sdk-s3-1.11.37.jar (Root Library)
- aws-java-sdk-core-1.11.37.jar
- :x: **jackson-databind-2.6.6.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://api.github.com/repos/mukul-seagate11/cortx-s3server/commits/03f1533c44ecd1d636be384cd5d10a8eb1e25f47">03f1533c44ecd1d636be384cd5d10a8eb1e25f47</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization.
<p>Publish Date: 2019-01-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-19362>CVE-2018-19362</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362</a></p>
<p>Release Date: 2019-01-02</p>
<p>Fix Resolution: 2.9.8</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2018-19362 (High) detected in jackson-databind-2.6.6.jar - ## CVE-2018-19362 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.6.6.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: cortx-s3server/auth-utils/jclient/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.6/jackson-databind-2.6.6.jar</p>
<p>
Dependency Hierarchy:
- aws-java-sdk-s3-1.11.37.jar (Root Library)
- aws-java-sdk-core-1.11.37.jar
- :x: **jackson-databind-2.6.6.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://api.github.com/repos/mukul-seagate11/cortx-s3server/commits/03f1533c44ecd1d636be384cd5d10a8eb1e25f47">03f1533c44ecd1d636be384cd5d10a8eb1e25f47</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization.
<p>Publish Date: 2019-01-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-19362>CVE-2018-19362</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362</a></p>
<p>Release Date: 2019-01-02</p>
<p>Fix Resolution: 2.9.8</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file cortx auth utils jclient pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy aws java sdk jar root library aws java sdk core jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details fasterxml jackson databind x before might allow attackers to have unspecified impact by leveraging failure to block the jboss common core class from polymorphic deserialization publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
143,987 | 11,590,404,994 | IssuesEvent | 2020-02-24 06:36:49 | escobard/create-app | https://api.github.com/repos/escobard/create-app | closed | UI - Note tests | Refactor UI Unit Tests enhancement | Part of the #39
1. Note CSS cleanup.
1. No Note logic & generic error logic setup.
1. No note and generic error catalog.
1. Note PropTypes.
1. Note unit tests. | 1.0 | UI - Note tests - Part of the #39
1. Note CSS cleanup.
1. No Note logic & generic error logic setup.
1. No note and generic error catalog.
1. Note PropTypes.
1. Note unit tests. | non_priority | ui note tests part of the note css cleanup no note logic generic error logic setup no note and generic error catalog note proptypes note unit tests | 0 |
148,990 | 23,410,973,219 | IssuesEvent | 2022-08-12 17:28:54 | piro17-Archive/FilmArchive | https://api.github.com/repos/piro17-Archive/FilmArchive | closed | [design] main 페이지 | 도윤 예진 design | ### 목적
> main 페이지 디자인하기
### 작업 상세 내용
- [x] 4페이지 swiper 적용
- [x] swiper autoplay 적용
- [x] 1, 2, 3등 프레임, 포즈/컨셉 순위
- [x] 네 컷 아카이브 설명
- [x] My 네 컷 앨범 자세히
- [x] My 네 컷 앨범 캘린더
- [x] 인생네컷 공유 프레임 자세히
- [x] 포즈 및 컨셉 추천 자세히
- [x] 한정판 프레임 자세히
### 유의사항
1,2,3등 기능이 완성되면 css 적용할 것
| 1.0 | [design] main 페이지 - ### 목적
> main 페이지 디자인하기
### 작업 상세 내용
- [x] 4페이지 swiper 적용
- [x] swiper autoplay 적용
- [x] 1, 2, 3등 프레임, 포즈/컨셉 순위
- [x] 네 컷 아카이브 설명
- [x] My 네 컷 앨범 자세히
- [x] My 네 컷 앨범 캘린더
- [x] 인생네컷 공유 프레임 자세히
- [x] 포즈 및 컨셉 추천 자세히
- [x] 한정판 프레임 자세히
### 유의사항
1,2,3등 기능이 완성되면 css 적용할 것
| non_priority | main 페이지 목적 main 페이지 디자인하기 작업 상세 내용 swiper 적용 swiper autoplay 적용 프레임 포즈 컨셉 순위 네 컷 아카이브 설명 my 네 컷 앨범 자세히 my 네 컷 앨범 캘린더 인생네컷 공유 프레임 자세히 포즈 및 컨셉 추천 자세히 한정판 프레임 자세히 유의사항 기능이 완성되면 css 적용할 것 | 0 |
49,345 | 13,186,625,418 | IssuesEvent | 2020-08-13 00:47:21 | icecube-trac/tix3 | https://api.github.com/repos/icecube-trac/tix3 | opened | [clast] TODOs (Trac #1207) | Incomplete Migration Migrated from Trac combo reconstruction defect | <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1207">https://code.icecube.wisc.edu/ticket/1207</a>, reported by david.schultz and owned by markw04</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2019-02-13T14:14:55",
"description": "Looks like there is more to be said. Let's fill that in or make some tickets.\n\n{{{\npublic/clast/I3CLastModule.h: * @todo There is probably more to be said here as David B. would put it.\npublic/clast/I3CLastCalculator.h: * @todo There is probably more to be said here as David B. would put it.\n}}}",
"reporter": "david.schultz",
"cc": "",
"resolution": "fixed",
"_ts": "1550067295757382",
"component": "combo reconstruction",
"summary": "[clast] TODOs",
"priority": "critical",
"keywords": "",
"time": "2015-08-19T19:25:33",
"milestone": "",
"owner": "markw04",
"type": "defect"
}
```
</p>
</details>
| 1.0 | [clast] TODOs (Trac #1207) - <details>
<summary><em>Migrated from <a href="https://code.icecube.wisc.edu/ticket/1207">https://code.icecube.wisc.edu/ticket/1207</a>, reported by david.schultz and owned by markw04</em></summary>
<p>
```json
{
"status": "closed",
"changetime": "2019-02-13T14:14:55",
"description": "Looks like there is more to be said. Let's fill that in or make some tickets.\n\n{{{\npublic/clast/I3CLastModule.h: * @todo There is probably more to be said here as David B. would put it.\npublic/clast/I3CLastCalculator.h: * @todo There is probably more to be said here as David B. would put it.\n}}}",
"reporter": "david.schultz",
"cc": "",
"resolution": "fixed",
"_ts": "1550067295757382",
"component": "combo reconstruction",
"summary": "[clast] TODOs",
"priority": "critical",
"keywords": "",
"time": "2015-08-19T19:25:33",
"milestone": "",
"owner": "markw04",
"type": "defect"
}
```
</p>
</details>
| non_priority | todos trac migrated from json status closed changetime description looks like there is more to be said let s fill that in or make some tickets n n npublic clast h todo there is probably more to be said here as david b would put it npublic clast h todo there is probably more to be said here as david b would put it n reporter david schultz cc resolution fixed ts component combo reconstruction summary todos priority critical keywords time milestone owner type defect | 0 |
290,632 | 25,081,591,425 | IssuesEvent | 2022-11-07 19:49:39 | hashicorp/terraform-provider-google | https://api.github.com/repos/hashicorp/terraform-provider-google | closed | Failing test(s): TestAccComputeDisk_imageDiffSuppressPublicVendorsFamilyNames | size/xs test failure crosslinked | <!--- This is a template for reporting test failures on nightly builds. It should only be used by core contributors who have access to our CI/CD results. --->
<!-- i.e. "Consistently since X date" or "X% failure in MONTH" -->
Failure rate: 100% since 2022-10-23
<!-- List all impacted tests for searchability. The title of the issue can instead list one or more groups of tests, or describe the overall root cause. -->
Impacted tests:
- TestAccComputeDisk_imageDiffSuppressPublicVendorsFamilyNames
<!-- Link to the nightly build(s), ideally with one impacted test opened -->
Nightly builds:
- https://ci-oss.hashicorp.engineering/buildConfiguration/GoogleCloud_ProviderGoogleCloudGoogleProject/348525?buildTab=tests&expandedTest=-7980878948564565037
<!-- The error message that displays in the tests tab, for reference -->
Message:
```
resource_compute_disk_test.go:283: should suppress diff for image "https://www.googleapis.com/compute/v1/projects/ubuntu-os-cloud/global/images/ubuntu-2210-kinetic-amd64-v20221022" and family "ubuntu-2210-amd64"
resource_compute_disk_test.go:283: should suppress diff for image "https://www.googleapis.com/compute/v1/projects/ubuntu-os-cloud/global/images/ubuntu-minimal-2210-kinetic-amd64-v20221022" and family "ubuntu-minimal-2210-amd64"
```
Same background as https://github.com/hashicorp/terraform-provider-google/issues/12143
b/256213974 | 1.0 | Failing test(s): TestAccComputeDisk_imageDiffSuppressPublicVendorsFamilyNames - <!--- This is a template for reporting test failures on nightly builds. It should only be used by core contributors who have access to our CI/CD results. --->
<!-- i.e. "Consistently since X date" or "X% failure in MONTH" -->
Failure rate: 100% since 2022-10-23
<!-- List all impacted tests for searchability. The title of the issue can instead list one or more groups of tests, or describe the overall root cause. -->
Impacted tests:
- TestAccComputeDisk_imageDiffSuppressPublicVendorsFamilyNames
<!-- Link to the nightly build(s), ideally with one impacted test opened -->
Nightly builds:
- https://ci-oss.hashicorp.engineering/buildConfiguration/GoogleCloud_ProviderGoogleCloudGoogleProject/348525?buildTab=tests&expandedTest=-7980878948564565037
<!-- The error message that displays in the tests tab, for reference -->
Message:
```
resource_compute_disk_test.go:283: should suppress diff for image "https://www.googleapis.com/compute/v1/projects/ubuntu-os-cloud/global/images/ubuntu-2210-kinetic-amd64-v20221022" and family "ubuntu-2210-amd64"
resource_compute_disk_test.go:283: should suppress diff for image "https://www.googleapis.com/compute/v1/projects/ubuntu-os-cloud/global/images/ubuntu-minimal-2210-kinetic-amd64-v20221022" and family "ubuntu-minimal-2210-amd64"
```
Same background as https://github.com/hashicorp/terraform-provider-google/issues/12143
b/256213974 | non_priority | failing test s testacccomputedisk imagediffsuppresspublicvendorsfamilynames failure rate since impacted tests testacccomputedisk imagediffsuppresspublicvendorsfamilynames nightly builds message resource compute disk test go should suppress diff for image and family ubuntu resource compute disk test go should suppress diff for image and family ubuntu minimal same background as b | 0 |
59,956 | 14,514,644,909 | IssuesEvent | 2020-12-13 09:13:59 | TalErez86/Test-Repository123 | https://api.github.com/repos/TalErez86/Test-Repository123 | opened | CVE-2020-17521 (Medium) detected in groovy-3.0.0.jar | security vulnerability | ## CVE-2020-17521 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>groovy-3.0.0.jar</b></p></summary>
<p>Groovy: A powerful, dynamic language for the JVM</p>
<p>Library home page: <a href="https://groovy-lang.org">https://groovy-lang.org</a></p>
<p>Path to dependency file: Test-Repository123/multi-module-maven-project-master/register-service/pom.xml</p>
<p>Path to vulnerable library: canner/.m2/repository/org/codehaus/groovy/groovy/3.0.0/groovy-3.0.0.jar</p>
<p>
Dependency Hierarchy:
- :x: **groovy-3.0.0.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/TalErez86/Test-Repository123/commit/4e4afbf004b9fd8ee375cc5c910630e64cb30a8e">4e4afbf004b9fd8ee375cc5c910630e64cb30a8e</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2.
<p>Publish Date: 2020-12-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-17521>CVE-2020-17521</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://issues.apache.org/jira/browse/GROOVY-9824">https://issues.apache.org/jira/browse/GROOVY-9824</a></p>
<p>Release Date: 2020-12-07</p>
<p>Fix Resolution: org.codehaus.groovy:groovy-all:2.4.21,2.5.14,3.0.7</p>
</p>
</details>
<p></p>
***
<!-- REMEDIATE-OPEN-PR-START -->
- [ ] Check this box to open an automated fix PR
<!-- REMEDIATE-OPEN-PR-END -->
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.codehaus.groovy","packageName":"groovy","packageVersion":"3.0.0","isTransitiveDependency":false,"dependencyTree":"org.codehaus.groovy:groovy:3.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.codehaus.groovy:groovy-all:2.4.21,2.5.14,3.0.7"}],"vulnerabilityIdentifier":"CVE-2020-17521","vulnerabilityDetails":"Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy\u0027s implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-17521","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-17521 (Medium) detected in groovy-3.0.0.jar - ## CVE-2020-17521 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>groovy-3.0.0.jar</b></p></summary>
<p>Groovy: A powerful, dynamic language for the JVM</p>
<p>Library home page: <a href="https://groovy-lang.org">https://groovy-lang.org</a></p>
<p>Path to dependency file: Test-Repository123/multi-module-maven-project-master/register-service/pom.xml</p>
<p>Path to vulnerable library: canner/.m2/repository/org/codehaus/groovy/groovy/3.0.0/groovy-3.0.0.jar</p>
<p>
Dependency Hierarchy:
- :x: **groovy-3.0.0.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/TalErez86/Test-Repository123/commit/4e4afbf004b9fd8ee375cc5c910630e64cb30a8e">4e4afbf004b9fd8ee375cc5c910630e64cb30a8e</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2.
<p>Publish Date: 2020-12-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-17521>CVE-2020-17521</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://issues.apache.org/jira/browse/GROOVY-9824">https://issues.apache.org/jira/browse/GROOVY-9824</a></p>
<p>Release Date: 2020-12-07</p>
<p>Fix Resolution: org.codehaus.groovy:groovy-all:2.4.21,2.5.14,3.0.7</p>
</p>
</details>
<p></p>
***
<!-- REMEDIATE-OPEN-PR-START -->
- [ ] Check this box to open an automated fix PR
<!-- REMEDIATE-OPEN-PR-END -->
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.codehaus.groovy","packageName":"groovy","packageVersion":"3.0.0","isTransitiveDependency":false,"dependencyTree":"org.codehaus.groovy:groovy:3.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.codehaus.groovy:groovy-all:2.4.21,2.5.14,3.0.7"}],"vulnerabilityIdentifier":"CVE-2020-17521","vulnerabilityDetails":"Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy\u0027s implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-17521","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in groovy jar cve medium severity vulnerability vulnerable library groovy jar groovy a powerful dynamic language for the jvm library home page a href path to dependency file test multi module maven project master register service pom xml path to vulnerable library canner repository org codehaus groovy groovy groovy jar dependency hierarchy x groovy jar vulnerable library found in head commit a href found in base branch main vulnerability details apache groovy provides extension methods to aid with creating temporary directories prior to this fix groovy s implementation of those extension methods was using a now superseded java jdk method call that is potentially not secure on some operating systems in some contexts users not using the extension methods mentioned in the advisory are not affected but may wish to read the advisory for further details versions affected to to to and alpha fixed in versions alpha publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org codehaus groovy groovy all check this box to open an automated fix pr isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails apache groovy provides extension methods to aid with creating temporary directories prior to this fix groovy implementation of those extension methods was using a now superseded java jdk method call that is potentially not secure on some operating systems in some contexts users not using the extension methods mentioned in the advisory are not affected but may wish to read the advisory for further details versions affected to to to and alpha fixed in versions alpha vulnerabilityurl | 0 |
7,290 | 5,962,202,896 | IssuesEvent | 2017-05-29 21:00:16 | JuliaLang/julia | https://api.github.com/repos/JuliaLang/julia | closed | spzeros and speye are really slow | performance sparse | I searched and couldn't find any open issue on this, which surprised me.
Not too sure what the problem is with the code in Base, but if I write my own `spzeros`, it is much faster (the same thing happens with `speye`):
```julia
julia> using BenchmarkTools
julia> @benchmark spzeros(5,5)
BenchmarkTools.Trial:
memory estimate: 1.11 KiB
allocs estimate: 18
--------------
minimum time: 9.330 μs (0.00% GC)
median time: 9.953 μs (0.00% GC)
mean time: 10.215 μs (0.00% GC)
maximum time: 60.647 μs (0.00% GC)
--------------
samples: 10000
evals/sample: 1
julia> function my_spzeros(m,n)
((m < 0) || (n < 0)) && throw(ArgumentError("invalid Array dimensions"))
rowval = Vector{Int}(0)
colptr = ones(Int,n+1)
nzval = Vector{Float64}(0)
return SparseMatrixCSC(m,n,colptr,rowval,nzval)
end
my_spzeros (generic function with 1 method)
julia> @benchmark my_spzeros(5,5)
BenchmarkTools.Trial:
memory estimate: 336 bytes
allocs estimate: 4
--------------
minimum time: 88.951 ns (0.00% GC)
median time: 97.654 ns (0.00% GC)
mean time: 117.422 ns (13.87% GC)
maximum time: 1.565 μs (0.00% GC)
--------------
samples: 10000
evals/sample: 965
```
| True | spzeros and speye are really slow - I searched and couldn't find any open issue on this, which surprised me.
Not too sure what the problem is with the code in Base, but if I write my own `spzeros`, it is much faster (the same thing happens with `speye`):
```julia
julia> using BenchmarkTools
julia> @benchmark spzeros(5,5)
BenchmarkTools.Trial:
memory estimate: 1.11 KiB
allocs estimate: 18
--------------
minimum time: 9.330 μs (0.00% GC)
median time: 9.953 μs (0.00% GC)
mean time: 10.215 μs (0.00% GC)
maximum time: 60.647 μs (0.00% GC)
--------------
samples: 10000
evals/sample: 1
julia> function my_spzeros(m,n)
((m < 0) || (n < 0)) && throw(ArgumentError("invalid Array dimensions"))
rowval = Vector{Int}(0)
colptr = ones(Int,n+1)
nzval = Vector{Float64}(0)
return SparseMatrixCSC(m,n,colptr,rowval,nzval)
end
my_spzeros (generic function with 1 method)
julia> @benchmark my_spzeros(5,5)
BenchmarkTools.Trial:
memory estimate: 336 bytes
allocs estimate: 4
--------------
minimum time: 88.951 ns (0.00% GC)
median time: 97.654 ns (0.00% GC)
mean time: 117.422 ns (13.87% GC)
maximum time: 1.565 μs (0.00% GC)
--------------
samples: 10000
evals/sample: 965
```
| non_priority | spzeros and speye are really slow i searched and couldn t find any open issue on this which surprised me not too sure what the problem is with the code in base but if i write my own spzeros it is much faster the same thing happens with speye julia julia using benchmarktools julia benchmark spzeros benchmarktools trial memory estimate kib allocs estimate minimum time μs gc median time μs gc mean time μs gc maximum time μs gc samples evals sample julia function my spzeros m n m n throw argumenterror invalid array dimensions rowval vector int colptr ones int n nzval vector return sparsematrixcsc m n colptr rowval nzval end my spzeros generic function with method julia benchmark my spzeros benchmarktools trial memory estimate bytes allocs estimate minimum time ns gc median time ns gc mean time ns gc maximum time μs gc samples evals sample | 0 |
35,918 | 7,834,258,272 | IssuesEvent | 2018-06-16 11:16:50 | StrikeNP/trac_test | https://api.github.com/repos/StrikeNP/trac_test | closed | Determine SILHS sampling level based on within-cloud rcm (Trac #758) | Migrated from Trac clubb_src defect raut@uwm.edu | **Introduction**
In https://github.com/larson-group/clubb/issues/752, we saw that calculating `k_lh_start` as `rcm / cloud_frac` improved results.
**Technical spec**
In this ticket, let's test and commit that change.
**Test**
Post plots.
Output should bin-diff identical for non-SILHS cases.
Attachments:
[r7424_k_lh_rcm_in_cloud.diff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_rcm_in_cloud.diff)
[r7424_k_lh_rcm_in_cloud.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_rcm_in_cloud.maff)
[r7424_k_lh_rcm_in_cloud_prescribed_probs.diff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_rcm_in_cloud_prescribed_probs.diff)
[r7424_k_lh_rcm_in_cloud_prescribed_probs.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_rcm_in_cloud_prescribed_probs.maff)
[r7424_k_lh_cld_presc_seed_2048.diff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_cld_presc_seed_2048.diff)
[r7424_k_lh_cld_presc_seed_2048.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_cld_presc_seed_2048.maff)
[k_lh_start_old_vs_new.svg](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/k_lh_start_old_vs_new.svg)
[rico_lh_comparison_test.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_comparison_test.maff)
[rico_lh_comp_1000.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_comp_1000.maff)
[rico_lh_comp_1000_whole_time_avg.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_comp_1000_whole_time_avg.maff)
[rico_lh_comp_1000_s50.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_comp_1000_s50.maff)
[rico_lh_1000_maxoverlap.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_1000_maxoverlap.maff)
Migrated from http://carson.math.uwm.edu/trac/clubb/ticket/758
```json
{
"status": "closed",
"changetime": "2015-06-16T20:14:49",
"description": "'''Introduction'''\n\nIn comment:14:ticket:752, we saw that calculating `k_lh_start` as `rcm / cloud_frac` improved results.\n\n'''Technical spec'''\n\nIn this ticket, let's test and commit that change.\n\n'''Test'''\n\nPost plots.\n\nOutput should bin-diff identical for non-SILHS cases.",
"reporter": "raut@uwm.edu",
"cc": "vlarson@uwm.edu",
"resolution": "continued",
"_ts": "1434485689429994",
"component": "clubb_src",
"summary": "Determine SILHS sampling level based on within-cloud rcm",
"priority": "major",
"keywords": "",
"time": "2014-12-17T01:03:06",
"milestone": "Improve SILHS",
"owner": "raut@uwm.edu",
"type": "defect"
}
```
| 1.0 | Determine SILHS sampling level based on within-cloud rcm (Trac #758) - **Introduction**
In https://github.com/larson-group/clubb/issues/752, we saw that calculating `k_lh_start` as `rcm / cloud_frac` improved results.
**Technical spec**
In this ticket, let's test and commit that change.
**Test**
Post plots.
Output should bin-diff identical for non-SILHS cases.
Attachments:
[r7424_k_lh_rcm_in_cloud.diff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_rcm_in_cloud.diff)
[r7424_k_lh_rcm_in_cloud.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_rcm_in_cloud.maff)
[r7424_k_lh_rcm_in_cloud_prescribed_probs.diff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_rcm_in_cloud_prescribed_probs.diff)
[r7424_k_lh_rcm_in_cloud_prescribed_probs.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_rcm_in_cloud_prescribed_probs.maff)
[r7424_k_lh_cld_presc_seed_2048.diff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_cld_presc_seed_2048.diff)
[r7424_k_lh_cld_presc_seed_2048.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/r7424_k_lh_cld_presc_seed_2048.maff)
[k_lh_start_old_vs_new.svg](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/k_lh_start_old_vs_new.svg)
[rico_lh_comparison_test.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_comparison_test.maff)
[rico_lh_comp_1000.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_comp_1000.maff)
[rico_lh_comp_1000_whole_time_avg.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_comp_1000_whole_time_avg.maff)
[rico_lh_comp_1000_s50.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_comp_1000_s50.maff)
[rico_lh_1000_maxoverlap.maff](https://github.com/larson-group/trac_attachment_archive/blob/master/clubb/rico_lh_1000_maxoverlap.maff)
Migrated from http://carson.math.uwm.edu/trac/clubb/ticket/758
```json
{
"status": "closed",
"changetime": "2015-06-16T20:14:49",
"description": "'''Introduction'''\n\nIn comment:14:ticket:752, we saw that calculating `k_lh_start` as `rcm / cloud_frac` improved results.\n\n'''Technical spec'''\n\nIn this ticket, let's test and commit that change.\n\n'''Test'''\n\nPost plots.\n\nOutput should bin-diff identical for non-SILHS cases.",
"reporter": "raut@uwm.edu",
"cc": "vlarson@uwm.edu",
"resolution": "continued",
"_ts": "1434485689429994",
"component": "clubb_src",
"summary": "Determine SILHS sampling level based on within-cloud rcm",
"priority": "major",
"keywords": "",
"time": "2014-12-17T01:03:06",
"milestone": "Improve SILHS",
"owner": "raut@uwm.edu",
"type": "defect"
}
```
| non_priority | determine silhs sampling level based on within cloud rcm trac introduction in we saw that calculating k lh start as rcm cloud frac improved results technical spec in this ticket let s test and commit that change test post plots output should bin diff identical for non silhs cases attachments migrated from json status closed changetime description introduction n nin comment ticket we saw that calculating k lh start as rcm cloud frac improved results n n technical spec n nin this ticket let s test and commit that change n n test n npost plots n noutput should bin diff identical for non silhs cases reporter raut uwm edu cc vlarson uwm edu resolution continued ts component clubb src summary determine silhs sampling level based on within cloud rcm priority major keywords time milestone improve silhs owner raut uwm edu type defect | 0 |
169,992 | 14,238,122,244 | IssuesEvent | 2020-11-18 18:09:51 | agustinanisaf/SquareCheck-android | https://api.github.com/repos/agustinanisaf/SquareCheck-android | closed | Create Github Issue Template | documentation | What to do
---
- [x] Create **New Feature** Issue Template
- [x] Create **Bug Report** Issue Template
References
---
- [Github Docs](https://docs.github.com/en/free-pro-team@latest/github/building-a-strong-community/configuring-issue-templates-for-your-repository) | 1.0 | Create Github Issue Template - What to do
---
- [x] Create **New Feature** Issue Template
- [x] Create **Bug Report** Issue Template
References
---
- [Github Docs](https://docs.github.com/en/free-pro-team@latest/github/building-a-strong-community/configuring-issue-templates-for-your-repository) | non_priority | create github issue template what to do create new feature issue template create bug report issue template references | 0 |
44,170 | 5,764,992,640 | IssuesEvent | 2017-04-27 00:23:59 | quicwg/base-drafts | https://api.github.com/repos/quicwg/base-drafts | closed | Get rid of the concurrent stream limit by advertising a maximum stream ID | design transport | We've already had a lot of discussions about the concurrent streams limit, which all brought us back to the problem that at every given moment both peers have to agree about the number of open streams, which seems to require a non-trivial amount of bookkeeping (of ACKs received for all STREAM frames sent on a given stream).
I'd like to propose a different solution, which solves this problem, and has a couple of nice additional properties as well:
A receiver advertises the maximum Stream ID it is willing to accept. The sender is allowed to open all streams that have IDs not larger than this number. The receiver can advertise a higher maximum Stream ID whenever it likes to, by sending a STREAM_LIMIT_UPDATE frame. STREAM_LIMIT_UPDATE is a retransmittable frame that contains a single value, the maximum Stream ID.
Note that conceptually, this is similar to advertising a flow control offset (and the rules for STREAM_LIMIT_UPDATEs would be similar to those for WINDOW_UPDATEs).
An implementation is free to choose any algorithm to determine which maximum Stream ID it advertises. The number of open streams may be used, but I can think of a couple of other ways to limit the state a peer can create. It would even be possible to advertise different limits depending on the server load. | 1.0 | Get rid of the concurrent stream limit by advertising a maximum stream ID - We've already had a lot of discussions about the concurrent streams limit, which all brought us back to the problem that at every given moment both peers have to agree about the number of open streams, which seems to require a non-trivial amount of bookkeeping (of ACKs received for all STREAM frames sent on a given stream).
I'd like to propose a different solution, which solves this problem, and has a couple of nice additional properties as well:
A receiver advertises the maximum Stream ID it is willing to accept. The sender is allowed to open all streams that have IDs not larger than this number. The receiver can advertise a higher maximum Stream ID whenever it likes to, by sending a STREAM_LIMIT_UPDATE frame. STREAM_LIMIT_UPDATE is a retransmittable frame that contains a single value, the maximum Stream ID.
Note that conceptually, this is similar to advertising a flow control offset (and the rules for STREAM_LIMIT_UPDATEs would be similar to those for WINDOW_UPDATEs).
An implementation is free to choose any algorithm to determine which maximum Stream ID it advertises. The number of open streams may be used, but I can think of a couple of other ways to limit the state a peer can create. It would even be possible to advertise different limits depending on the server load. | non_priority | get rid of the concurrent stream limit by advertising a maximum stream id we ve already had a lot of discussions about the concurrent streams limit which all brought us back to the problem that at every given moment both peers have to agree about the number of open streams which seems to require a non trivial amount of bookkeeping of acks received for all stream frames sent on a given stream i d like to propose a different solution which solves this problem and has a couple of nice additional properties as well a receiver advertises the maximum stream id it is willing to accept the sender is allowed to open all streams that have ids not larger than this number the receiver can advertise a higher maximum stream id whenever it likes to by sending a stream limit update frame stream limit update is a retransmittable frame that contains a single value the maximum stream id note that conceptually this is similar to advertising a flow control offset and the rules for stream limit updates would be similar to those for window updates an implementation is free to choose any algorithm to determine which maximum stream id it advertises the number of open streams may be used but i can think of a couple of other ways to limit the state a peer can create it would even be possible to advertise different limits depending on the server load | 0 |
256,329 | 27,561,650,831 | IssuesEvent | 2023-03-07 22:37:53 | samqws-marketing/nutanix_Nutanix-Calm-Jenkins-Plugin | https://api.github.com/repos/samqws-marketing/nutanix_Nutanix-Calm-Jenkins-Plugin | closed | CVE-2021-4104 (High) detected in log4j-1.2.17.jar - autoclosed | security vulnerability | ## CVE-2021-4104 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-1.2.17.jar</b></p></summary>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- jsse-2.0.5.jar (Root Library)
- ssl-proxies-2.0.5.jar
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2021-12-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-4104>CVE-2021-4104</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">https://nvd.nist.gov/vuln/detail/CVE-2021-4104</a></p>
<p>Release Date: 2021-12-14</p>
<p>Fix Resolution: uom-parent - 1.0.3-3.module,1.0.3-3.module;uom-se-javadoc - 1.0.4-3.module;parfait-examples - 0.5.4-4.module;log4j-manual - 1.2.17-16;si-units-javadoc - 0.6.5-2.module;unit-api - 1.0-5.module,1.0-5.module;unit-api-javadoc - 1.0-5.module;parfait - 0.5.4-4.module,0.5.4-4.module;log4j-javadoc - 1.2.17-16;uom-systems-javadoc - 0.7-1.module;uom-lib-javadoc - 1.0.1-6.module;uom-systems - 0.7-1.module,0.7-1.module;log4j - 1.2.17-16,1.2.17-16;uom-se - 1.0.4-3.module,1.0.4-3.module;uom-lib - 1.0.1-6.module,1.0.1-6.module;parfait-javadoc - 0.5.4-4.module;pcp-parfait-agent - 0.5.4-4.module;si-units - 0.6.5-2.module,0.6.5-2.module</p>
</p>
</details>
<p></p>
| True | CVE-2021-4104 (High) detected in log4j-1.2.17.jar - autoclosed - ## CVE-2021-4104 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-1.2.17.jar</b></p></summary>
<p>Apache Log4j 1.2</p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar</p>
<p>
Dependency Hierarchy:
- jsse-2.0.5.jar (Root Library)
- ssl-proxies-2.0.5.jar
- :x: **log4j-1.2.17.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
<p>Publish Date: 2021-12-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-4104>CVE-2021-4104</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">https://nvd.nist.gov/vuln/detail/CVE-2021-4104</a></p>
<p>Release Date: 2021-12-14</p>
<p>Fix Resolution: uom-parent - 1.0.3-3.module,1.0.3-3.module;uom-se-javadoc - 1.0.4-3.module;parfait-examples - 0.5.4-4.module;log4j-manual - 1.2.17-16;si-units-javadoc - 0.6.5-2.module;unit-api - 1.0-5.module,1.0-5.module;unit-api-javadoc - 1.0-5.module;parfait - 0.5.4-4.module,0.5.4-4.module;log4j-javadoc - 1.2.17-16;uom-systems-javadoc - 0.7-1.module;uom-lib-javadoc - 1.0.1-6.module;uom-systems - 0.7-1.module,0.7-1.module;log4j - 1.2.17-16,1.2.17-16;uom-se - 1.0.4-3.module,1.0.4-3.module;uom-lib - 1.0.1-6.module,1.0.1-6.module;parfait-javadoc - 0.5.4-4.module;pcp-parfait-agent - 0.5.4-4.module;si-units - 0.6.5-2.module,0.6.5-2.module</p>
</p>
</details>
<p></p>
| non_priority | cve high detected in jar autoclosed cve high severity vulnerability vulnerable library jar apache path to dependency file pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy jsse jar root library ssl proxies jar x jar vulnerable library found in base branch master vulnerability details jmsappender in is vulnerable to deserialization of untrusted data when the attacker has write access to the configuration the attacker can provide topicbindingname and topicconnectionfactorybindingname configurations causing jmsappender to perform jndi requests that result in remote code execution in a similar fashion to cve note this issue only affects when specifically configured to use jmsappender which is not the default apache reached end of life in august users should upgrade to as it addresses numerous other issues from the previous versions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution uom parent module module uom se javadoc module parfait examples module manual si units javadoc module unit api module module unit api javadoc module parfait module module javadoc uom systems javadoc module uom lib javadoc module uom systems module module uom se module module uom lib module module parfait javadoc module pcp parfait agent module si units module module | 0 |
111,710 | 9,539,544,545 | IssuesEvent | 2019-04-30 17:13:26 | kcigeospatial/Fred_Co_Land-Management | https://api.github.com/repos/kcigeospatial/Fred_Co_Land-Management | closed | Planning-APFO-stuck in under review | Ready For Retest | stuck in under review. There is no review to review.

MW | 1.0 | Planning-APFO-stuck in under review - stuck in under review. There is no review to review.

MW | non_priority | planning apfo stuck in under review stuck in under review there is no review to review mw | 0 |
179,240 | 30,204,769,581 | IssuesEvent | 2023-07-05 08:41:41 | Tonomy-Foundation/Tonomy-ID-Management | https://api.github.com/repos/Tonomy-Foundation/Tonomy-ID-Management | opened | Design what happens if user uses bad password | design |
Acceptance criteria
- [ ] design view for if the user password has been used before
Inspiration
- https://haveibeenpwned.com/Passwords | 1.0 | Design what happens if user uses bad password -
Acceptance criteria
- [ ] design view for if the user password has been used before
Inspiration
- https://haveibeenpwned.com/Passwords | non_priority | design what happens if user uses bad password acceptance criteria design view for if the user password has been used before inspiration | 0 |
46,098 | 13,150,337,597 | IssuesEvent | 2020-08-09 10:57:28 | shaundmorris/ddf | https://api.github.com/repos/shaundmorris/ddf | closed | CVE-2018-11695 High Severity Vulnerability detected by WhiteSource | security vulnerability wontfix | ## CVE-2018-11695 - High Severity Vulnerability
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sassv4.9.4</b></p></summary>
<p>
<p>:rainbow: Node.js bindings to libsass</p>
<p>Library home page: <a href=https://github.com/sass/node-sass.git>https://github.com/sass/node-sass.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/shaundmorris/ddf/commit/ea35fc52f05b85ef437e9a9e39a887ad51692ff0">ea35fc52f05b85ef437e9a9e39a887ad51692ff0</a></p>
</p>
</details>
</p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Library Source Files (121)</summary>
<p></p>
<p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p>
<p>
- /ddf/ui/node_modules/node-sass/src/libsass/src/error_handling.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/output.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/output.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/check_nesting.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass_values.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/check_nesting.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/bind.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/test/test_node.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/constants.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/eval.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/plugins.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/include/sass/base.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/prelexer.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/subset_map.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/extend.cpp
- /ddf/ui/node_modules/node-sass/src/custom_importer_bridge.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/contrib/plugin.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/lexer.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass_util.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/test/test_superselector.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/cencode.c
- /ddf/ui/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/utf8_string.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/file.cpp
- /ddf/ui/node_modules/node-sass/src/callback_bridge.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/subset_map.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/include/sass2scss.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass_functions.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/emitter.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/environment.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/paths.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/expand.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/listize.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/test/test_unification.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/source_map.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/inspect.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/source_map.hpp
- /ddf/ui/node_modules/node-sass/src/sass_types/list.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass_functions.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/json.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass_util.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/position.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/listize.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/error_handling.hpp
- /ddf/ui/node_modules/node-sass/src/sass_types/string.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/eval.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/environment.hpp
- /ddf/ui/node_modules/node-sass/src/sass_types/boolean.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/emitter.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/extend.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/lexer.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/functions.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/debugger.hpp
- /ddf/ui/node_modules/node-sass/src/sass_types/factory.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/prelexer.cpp
- /ddf/ui/node_modules/node-sass/src/sass_types/color.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/operation.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/ast.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/constants.hpp
- /ddf/ui/node_modules/node-sass/src/sass_types/boolean.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/context.hpp
- /ddf/ui/node_modules/node-sass/src/sass_types/value.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/units.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/cssize.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/parser.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/functions.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/position.hpp
- /ddf/ui/node_modules/node-sass/src/sass_context_wrapper.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass_context.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/node.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/ast_fwd_decl.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/cssize.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/remove_placeholders.cpp
- /ddf/ui/node_modules/node-sass/src/binding.cpp
- /ddf/ui/node_modules/node-sass/src/sass_types/list.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/include/sass/functions.h
- /ddf/ui/node_modules/node-sass/src/custom_function_bridge.cpp
- /ddf/ui/node_modules/node-sass/src/custom_importer_bridge.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/color_maps.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/utf8_string.cpp
- /ddf/ui/node_modules/node-sass/src/sass_types/sass_value_wrapper.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/ast.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/values.cpp
- /ddf/ui/node_modules/node-sass/src/sass_context_wrapper.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/b64/encode.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/base64vlq.cpp
- /ddf/ui/node_modules/node-sass/src/sass_types/number.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/c99func.c
- /ddf/ui/node_modules/node-sass/src/libsass/src/node.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/remove_placeholders.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/util.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/memory/SharedPtr.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/backtrace.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/include/sass/values.h
- /ddf/ui/node_modules/node-sass/src/libsass/test/test_subset_map.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass2scss.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass_context.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/memory/SharedPtr.cpp
- /ddf/ui/node_modules/node-sass/src/sass_types/null.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/expand.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/to_value.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/context.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/include/sass/context.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/to_c.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass_values.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/color_maps.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/inspect.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/script/test-leaks.pl
- /ddf/ui/node_modules/node-sass/src/libsass/src/to_c.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/util.hpp
- /ddf/ui/node_modules/node-sass/src/sass_types/map.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/file.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/units.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/plugins.hpp
- /ddf/ui/node_modules/node-sass/src/sass_types/color.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/to_value.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/debug.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/parser.hpp
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in LibSass through 3.5.2. A NULL pointer dereference was found in the function Sass::Expand::operator which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact.
<p>Publish Date: 2018-06-04
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11695>CVE-2018-11695</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2018-11695 High Severity Vulnerability detected by WhiteSource - ## CVE-2018-11695 - High Severity Vulnerability
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>node-sassv4.9.4</b></p></summary>
<p>
<p>:rainbow: Node.js bindings to libsass</p>
<p>Library home page: <a href=https://github.com/sass/node-sass.git>https://github.com/sass/node-sass.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/shaundmorris/ddf/commit/ea35fc52f05b85ef437e9a9e39a887ad51692ff0">ea35fc52f05b85ef437e9a9e39a887ad51692ff0</a></p>
</p>
</details>
</p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Library Source Files (121)</summary>
<p></p>
<p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p>
<p>
- /ddf/ui/node_modules/node-sass/src/libsass/src/error_handling.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/output.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/output.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/check_nesting.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass_values.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/check_nesting.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/bind.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/test/test_node.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/constants.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/eval.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/plugins.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/include/sass/base.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/prelexer.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/subset_map.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/extend.cpp
- /ddf/ui/node_modules/node-sass/src/custom_importer_bridge.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/contrib/plugin.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/lexer.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass_util.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/test/test_superselector.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/cencode.c
- /ddf/ui/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/utf8_string.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/file.cpp
- /ddf/ui/node_modules/node-sass/src/callback_bridge.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/subset_map.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/include/sass2scss.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass_functions.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/emitter.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/environment.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/paths.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/expand.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/listize.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/test/test_unification.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/source_map.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/inspect.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/source_map.hpp
- /ddf/ui/node_modules/node-sass/src/sass_types/list.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass_functions.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/json.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass_util.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/position.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/listize.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/error_handling.hpp
- /ddf/ui/node_modules/node-sass/src/sass_types/string.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/eval.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/environment.hpp
- /ddf/ui/node_modules/node-sass/src/sass_types/boolean.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/emitter.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/extend.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/lexer.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/functions.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/debugger.hpp
- /ddf/ui/node_modules/node-sass/src/sass_types/factory.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/prelexer.cpp
- /ddf/ui/node_modules/node-sass/src/sass_types/color.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/operation.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/ast.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/constants.hpp
- /ddf/ui/node_modules/node-sass/src/sass_types/boolean.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/context.hpp
- /ddf/ui/node_modules/node-sass/src/sass_types/value.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/units.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/cssize.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/parser.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/functions.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/position.hpp
- /ddf/ui/node_modules/node-sass/src/sass_context_wrapper.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass_context.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/node.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/ast_fwd_decl.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/cssize.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/remove_placeholders.cpp
- /ddf/ui/node_modules/node-sass/src/binding.cpp
- /ddf/ui/node_modules/node-sass/src/sass_types/list.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/include/sass/functions.h
- /ddf/ui/node_modules/node-sass/src/custom_function_bridge.cpp
- /ddf/ui/node_modules/node-sass/src/custom_importer_bridge.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/color_maps.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/utf8_string.cpp
- /ddf/ui/node_modules/node-sass/src/sass_types/sass_value_wrapper.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/ast.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/values.cpp
- /ddf/ui/node_modules/node-sass/src/sass_context_wrapper.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/b64/encode.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/base64vlq.cpp
- /ddf/ui/node_modules/node-sass/src/sass_types/number.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/c99func.c
- /ddf/ui/node_modules/node-sass/src/libsass/src/node.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/remove_placeholders.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/util.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/memory/SharedPtr.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/backtrace.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/include/sass/values.h
- /ddf/ui/node_modules/node-sass/src/libsass/test/test_subset_map.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass2scss.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass_context.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/memory/SharedPtr.cpp
- /ddf/ui/node_modules/node-sass/src/sass_types/null.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/expand.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/to_value.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/context.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/include/sass/context.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/to_c.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/sass_values.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/color_maps.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/inspect.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/script/test-leaks.pl
- /ddf/ui/node_modules/node-sass/src/libsass/src/to_c.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/util.hpp
- /ddf/ui/node_modules/node-sass/src/sass_types/map.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/file.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/units.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/plugins.hpp
- /ddf/ui/node_modules/node-sass/src/sass_types/color.h
- /ddf/ui/node_modules/node-sass/src/libsass/src/to_value.cpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/debug.hpp
- /ddf/ui/node_modules/node-sass/src/libsass/src/parser.hpp
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in LibSass through 3.5.2. A NULL pointer dereference was found in the function Sass::Expand::operator which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact.
<p>Publish Date: 2018-06-04
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11695>CVE-2018-11695</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high severity vulnerability detected by whitesource cve high severity vulnerability vulnerable library node rainbow node js bindings to libsass library home page a href found in head commit a href library source files the source files were matched to this source library based on a best effort match source libraries are selected from a list of probable public libraries ddf ui node modules node sass src libsass src error handling cpp ddf ui node modules node sass src libsass src output cpp ddf ui node modules node sass src libsass src output hpp ddf ui node modules node sass src libsass src check nesting cpp ddf ui node modules node sass src libsass src sass values hpp ddf ui node modules node sass src libsass src check nesting hpp ddf ui node modules node sass src libsass src bind cpp ddf ui node modules node sass src libsass test test node cpp ddf ui node modules node sass src libsass src constants cpp ddf ui node modules node sass src libsass src eval hpp ddf ui node modules node sass src libsass src plugins cpp ddf ui node modules node sass src libsass include sass base h ddf ui node modules node sass src libsass src prelexer hpp ddf ui node modules node sass src libsass src subset map hpp ddf ui node modules node sass src libsass src extend cpp ddf ui node modules node sass src custom importer bridge cpp ddf ui node modules node sass src libsass contrib plugin cpp ddf ui node modules node sass src libsass src lexer hpp ddf ui node modules node sass src libsass src sass util cpp ddf ui node modules node sass src libsass test test superselector cpp ddf ui node modules node sass src libsass src cencode c ddf ui node modules node sass src libsass src ast fwd decl hpp ddf ui node modules node sass src libsass src string hpp ddf ui node modules node sass src libsass src file cpp ddf ui node modules node sass src callback bridge h ddf ui node modules node sass src libsass src subset map cpp ddf ui node modules node sass src libsass include h ddf ui node modules node sass src libsass src sass functions hpp ddf ui node modules node sass src libsass src emitter cpp ddf ui node modules node sass src libsass src environment cpp ddf ui node modules node sass src libsass src ast def macros hpp ddf ui node modules node sass src libsass src paths hpp ddf ui node modules node sass src libsass src expand cpp ddf ui node modules node sass src libsass src listize cpp ddf ui node modules node sass src libsass test test unification cpp ddf ui node modules node sass src libsass src source map cpp ddf ui node modules node sass src libsass src inspect cpp ddf ui node modules node sass src libsass src source map hpp ddf ui node modules node sass src sass types list h ddf ui node modules node sass src libsass src sass functions cpp ddf ui node modules node sass src libsass src json cpp ddf ui node modules node sass src libsass src sass util hpp ddf ui node modules node sass src libsass src position cpp ddf ui node modules node sass src libsass src listize hpp ddf ui node modules node sass src libsass src error handling hpp ddf ui node modules node sass src sass types string cpp ddf ui node modules node sass src libsass src eval cpp ddf ui node modules node sass src libsass src environment hpp ddf ui node modules node sass src sass types boolean h ddf ui node modules node sass src libsass src emitter hpp ddf ui node modules node sass src libsass src extend hpp ddf ui node modules node sass src libsass src lexer cpp ddf ui node modules node sass src libsass src functions cpp ddf ui node modules node sass src libsass src debugger hpp ddf ui node modules node sass src sass types factory cpp ddf ui node modules node sass src libsass src prelexer cpp ddf ui node modules node sass src sass types color cpp ddf ui node modules node sass src libsass src operation hpp ddf ui node modules node sass src libsass src ast cpp ddf ui node modules node sass src libsass src sass hpp ddf ui node modules node sass src libsass src constants hpp ddf ui node modules node sass src sass types boolean cpp ddf ui node modules node sass src libsass src context hpp ddf ui node modules node sass src sass types value h ddf ui node modules node sass src libsass src units cpp ddf ui node modules node sass src libsass src cssize hpp ddf ui node modules node sass src libsass src parser cpp ddf ui node modules node sass src libsass src functions hpp ddf ui node modules node sass src libsass src position hpp ddf ui node modules node sass src sass context wrapper cpp ddf ui node modules node sass src libsass src sass context hpp ddf ui node modules node sass src libsass src node cpp ddf ui node modules node sass src libsass src ast fwd decl cpp ddf ui node modules node sass src libsass src cssize cpp ddf ui node modules node sass src libsass src remove placeholders cpp ddf ui node modules node sass src binding cpp ddf ui node modules node sass src sass types list cpp ddf ui node modules node sass src libsass include sass functions h ddf ui node modules node sass src custom function bridge cpp ddf ui node modules node sass src custom importer bridge h ddf ui node modules node sass src libsass src color maps cpp ddf ui node modules node sass src libsass src string cpp ddf ui node modules node sass src sass types sass value wrapper h ddf ui node modules node sass src libsass src ast hpp ddf ui node modules node sass src libsass src values cpp ddf ui node modules node sass src sass context wrapper h ddf ui node modules node sass src libsass src encode h ddf ui node modules node sass src libsass src sass cpp ddf ui node modules node sass src libsass src cpp ddf ui node modules node sass src sass types number cpp ddf ui node modules node sass src libsass src c ddf ui node modules node sass src libsass src node hpp ddf ui node modules node sass src libsass src remove placeholders hpp ddf ui node modules node sass src libsass src util cpp ddf ui node modules node sass src libsass src memory sharedptr hpp ddf ui node modules node sass src libsass src backtrace hpp ddf ui node modules node sass src libsass include sass values h ddf ui node modules node sass src libsass test test subset map cpp ddf ui node modules node sass src libsass src cpp ddf ui node modules node sass src libsass src sass context cpp ddf ui node modules node sass src libsass src memory sharedptr cpp ddf ui node modules node sass src sass types null cpp ddf ui node modules node sass src libsass src expand hpp ddf ui node modules node sass src libsass src to value hpp ddf ui node modules node sass src libsass src context cpp ddf ui node modules node sass src libsass include sass context h ddf ui node modules node sass src libsass src to c cpp ddf ui node modules node sass src libsass src sass values cpp ddf ui node modules node sass src libsass src color maps hpp ddf ui node modules node sass src libsass src inspect hpp ddf ui node modules node sass src libsass script test leaks pl ddf ui node modules node sass src libsass src to c hpp ddf ui node modules node sass src libsass src util hpp ddf ui node modules node sass src sass types map cpp ddf ui node modules node sass src libsass src file hpp ddf ui node modules node sass src libsass src units hpp ddf ui node modules node sass src libsass src plugins hpp ddf ui node modules node sass src sass types color h ddf ui node modules node sass src libsass src to value cpp ddf ui node modules node sass src libsass src debug hpp ddf ui node modules node sass src libsass src parser hpp vulnerability details an issue was discovered in libsass through a null pointer dereference was found in the function sass expand operator which could be leveraged by an attacker to cause a denial of service application crash or possibly have unspecified other impact publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with whitesource | 0 |
38,449 | 6,671,655,675 | IssuesEvent | 2017-10-04 08:21:22 | encode/django-rest-framework | https://api.github.com/repos/encode/django-rest-framework | closed | Documenting your API: add highlighted chunk of code in docstrings | Enhancement Interactive API Documentation | Thinking that also highlighted code-blocks were enabled in the dynamic documentation I started to investigate why code-block (also without highlight) not works and at the end I found that there is a strip that remove any kind of indentation, that is bad for code-blocks.
```
--- schemas_orig.py 2017-08-30 14:45:38.061047196 +0000
+++ schemas.py 2017-08-30 14:46:10.317254482 +0000
@@ -476,7 +476,7 @@
return formatting.dedent(smart_text(method_docstring))
description = view.get_view_description()
- lines = [line.strip() for line in description.splitlines()]
+ lines = [line for line in description.splitlines()]
current_section = ''
sections = {'': ''}
```
At the end, adding this change and a proper Preprocessor for markdown in the ``render_markdown`` function I achieved my goal:

Starting from this docstring:
```
"""
get:
Return the list of country objects with **iso2**,
**name** and **region** fields.
@@ json @@
[
{
"first": "string-value",
"second": null
},
{
"one": 1,
"two": 2
}
]
@@
"""
```
I want to submit a PR with this (small) change but before I would know if the ``line.strip()`` has a precise meaning and cannot be removed or not.
Thank you, Matteo. | 1.0 | Documenting your API: add highlighted chunk of code in docstrings - Thinking that also highlighted code-blocks were enabled in the dynamic documentation I started to investigate why code-block (also without highlight) not works and at the end I found that there is a strip that remove any kind of indentation, that is bad for code-blocks.
```
--- schemas_orig.py 2017-08-30 14:45:38.061047196 +0000
+++ schemas.py 2017-08-30 14:46:10.317254482 +0000
@@ -476,7 +476,7 @@
return formatting.dedent(smart_text(method_docstring))
description = view.get_view_description()
- lines = [line.strip() for line in description.splitlines()]
+ lines = [line for line in description.splitlines()]
current_section = ''
sections = {'': ''}
```
At the end, adding this change and a proper Preprocessor for markdown in the ``render_markdown`` function I achieved my goal:

Starting from this docstring:
```
"""
get:
Return the list of country objects with **iso2**,
**name** and **region** fields.
@@ json @@
[
{
"first": "string-value",
"second": null
},
{
"one": 1,
"two": 2
}
]
@@
"""
```
I want to submit a PR with this (small) change but before I would know if the ``line.strip()`` has a precise meaning and cannot be removed or not.
Thank you, Matteo. | non_priority | documenting your api add highlighted chunk of code in docstrings thinking that also highlighted code blocks were enabled in the dynamic documentation i started to investigate why code block also without highlight not works and at the end i found that there is a strip that remove any kind of indentation that is bad for code blocks schemas orig py schemas py return formatting dedent smart text method docstring description view get view description lines lines current section sections at the end adding this change and a proper preprocessor for markdown in the render markdown function i achieved my goal starting from this docstring get return the list of country objects with name and region fields json first string value second null one two i want to submit a pr with this small change but before i would know if the line strip has a precise meaning and cannot be removed or not thank you matteo | 0 |
262,596 | 27,972,681,020 | IssuesEvent | 2023-03-25 07:29:32 | elastic/integrations | https://api.github.com/repos/elastic/integrations | closed | [Check Point] Improved Documentation | Team:Security-External Integrations Integration:Checkpoint | Our [Check Point integration](https://docs.elastic.co/integrations/checkpoint) does not follow our [documentation guidelines](https://github.com/elastic/integrations/blob/main/docs/documentation_guidelines.md) and needs to be updated to ensure users can successfully configure the integration. Our documentation can be based on the steps to configure Checkpoint's current R81 OS - no need to focus on steps for EOL OS such as R80 and R77.
I'll can get a marketing blurb from Check Point, but the biggest gap in our docs is the configuration steps on the Log Exporter side. We need to make clear, the steps involved on the Log Exporter side to syslog out to an Elastic Agent. We need to make it clear which syslog formats we support, and how to configure Secure Syslog (over TLS).
High level steps (needs refinement):
1. Install Elastic Agent on a host between your Check Point Log Exporter instance and Elastic Cluster. The agent will be used to receive syslog from Check Point firewalls and ship to Elastic.
2. Create a new [Log Exporter/SIEM object](https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Log-Exporter-Configuration-in-SmartConsole.htm?tocpath=Log%20Exporter%7C_____2) in Check Point SmartConsole. Set the target server and target port to the Elastic Agent IP address and port number. Set the protocol to UDP or TCP, Elastic's integration supports both. Set the format to syslog, JSON??
3. Configure the Management Server or Dedicated Log Server object in SmartConsole.
4. Install the database within SmartConsole (steps included in the Checkpoint docs linked above)
5. Within Kibana, browse to Integrations and locate the Check Point integration, and 'Add Check Point'
6. Configure the TCP or UDP input, depending on the protocol you configured Check Point to use.
7. Add certificate if using Secure Syslog over TCP with TLS (optional)
8. Add integration to a New/Existing policy.
9. Browse to dashboard/discover to validate data is flowing from Check Point.
We also list 'firewall' as the supported dataset - do we support all events from Check Point firewalls, if so this should be clearly stated. If not, we need to list the broad categories of events we support. | True | [Check Point] Improved Documentation - Our [Check Point integration](https://docs.elastic.co/integrations/checkpoint) does not follow our [documentation guidelines](https://github.com/elastic/integrations/blob/main/docs/documentation_guidelines.md) and needs to be updated to ensure users can successfully configure the integration. Our documentation can be based on the steps to configure Checkpoint's current R81 OS - no need to focus on steps for EOL OS such as R80 and R77.
I'll can get a marketing blurb from Check Point, but the biggest gap in our docs is the configuration steps on the Log Exporter side. We need to make clear, the steps involved on the Log Exporter side to syslog out to an Elastic Agent. We need to make it clear which syslog formats we support, and how to configure Secure Syslog (over TLS).
High level steps (needs refinement):
1. Install Elastic Agent on a host between your Check Point Log Exporter instance and Elastic Cluster. The agent will be used to receive syslog from Check Point firewalls and ship to Elastic.
2. Create a new [Log Exporter/SIEM object](https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Log-Exporter-Configuration-in-SmartConsole.htm?tocpath=Log%20Exporter%7C_____2) in Check Point SmartConsole. Set the target server and target port to the Elastic Agent IP address and port number. Set the protocol to UDP or TCP, Elastic's integration supports both. Set the format to syslog, JSON??
3. Configure the Management Server or Dedicated Log Server object in SmartConsole.
4. Install the database within SmartConsole (steps included in the Checkpoint docs linked above)
5. Within Kibana, browse to Integrations and locate the Check Point integration, and 'Add Check Point'
6. Configure the TCP or UDP input, depending on the protocol you configured Check Point to use.
7. Add certificate if using Secure Syslog over TCP with TLS (optional)
8. Add integration to a New/Existing policy.
9. Browse to dashboard/discover to validate data is flowing from Check Point.
We also list 'firewall' as the supported dataset - do we support all events from Check Point firewalls, if so this should be clearly stated. If not, we need to list the broad categories of events we support. | non_priority | improved documentation our does not follow our and needs to be updated to ensure users can successfully configure the integration our documentation can be based on the steps to configure checkpoint s current os no need to focus on steps for eol os such as and i ll can get a marketing blurb from check point but the biggest gap in our docs is the configuration steps on the log exporter side we need to make clear the steps involved on the log exporter side to syslog out to an elastic agent we need to make it clear which syslog formats we support and how to configure secure syslog over tls high level steps needs refinement install elastic agent on a host between your check point log exporter instance and elastic cluster the agent will be used to receive syslog from check point firewalls and ship to elastic create a new in check point smartconsole set the target server and target port to the elastic agent ip address and port number set the protocol to udp or tcp elastic s integration supports both set the format to syslog json configure the management server or dedicated log server object in smartconsole install the database within smartconsole steps included in the checkpoint docs linked above within kibana browse to integrations and locate the check point integration and add check point configure the tcp or udp input depending on the protocol you configured check point to use add certificate if using secure syslog over tcp with tls optional add integration to a new existing policy browse to dashboard discover to validate data is flowing from check point we also list firewall as the supported dataset do we support all events from check point firewalls if so this should be clearly stated if not we need to list the broad categories of events we support | 0 |
27,503 | 21,795,357,227 | IssuesEvent | 2022-05-15 14:48:55 | dotnet/sdk | https://api.github.com/repos/dotnet/sdk | closed | Single EXE build takes minutes to launch, self contained build launches in seconds | Area-Infrastructure untriaged | ### Describe the bug
Links two different builds of the same program:
- Self contained, ready to run, win-x86 - [selfcontained.zip](https://drive.google.com/file/d/1ePBlypgj5QspcndbHw412vRMgWtbPDwo/view?usp=sharing)
- Single EXE, ready to run, win-86 - [singleexe.zip](https://drive.google.com/file/d/1VGUauy-8Q4G4_9qJq05cXaMJNxnCO_yk/view?usp=sharing)
Both programs run, however the single EXE version takes over two minutes to display the first screen. The self-contained version launches in seconds.
Builds are NOT trimmed.
Code can be found at https://github.com/mike-ward/Loon
### Further technical details
- Include the output of `dotnet --info`
```
► dotnet --info
.NET SDK (reflecting any global.json):
Version: 6.0.300
Commit: 8473146e7d
Runtime Environment:
OS Name: Windows
OS Version: 10.0.19043
OS Platform: Windows
RID: win10-x64
Base Path: C:\Program Files\dotnet\sdk\6.0.300\
Host (useful for support):
Version: 7.0.0-preview.1.22076.8
Commit: 405337939c
.NET SDKs installed:
2.2.207 [C:\Program Files\dotnet\sdk]
3.1.416 [C:\Program Files\dotnet\sdk]
6.0.101 [C:\Program Files\dotnet\sdk]
6.0.201 [C:\Program Files\dotnet\sdk]
6.0.300 [C:\Program Files\dotnet\sdk]
.NET runtimes installed:
Microsoft.AspNetCore.All 2.2.8 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.All]
Microsoft.AspNetCore.App 2.2.8 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.AspNetCore.App 3.1.22 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.AspNetCore.App 6.0.1 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.AspNetCore.App 6.0.3 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.NETCore.App 2.2.8 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.NETCore.App 3.1.22 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.NETCore.App 3.1.23 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.NETCore.App 5.0.14 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.NETCore.App 6.0.1 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.NETCore.App 6.0.3 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.NETCore.App 7.0.0-preview.1.22076.8 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.WindowsDesktop.App 3.1.22 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
Microsoft.WindowsDesktop.App 3.1.23 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
Microsoft.WindowsDesktop.App 5.0.14 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
Microsoft.WindowsDesktop.App 6.0.1 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
Microsoft.WindowsDesktop.App 6.0.3 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
```
- The IDE (VS / VS Code/ VS4Mac) you're running on, and its version
```
JetBrains Rider 2022.1.1
Build #RD-221.5591.20, built on April 28, 2022
Runtime version: 11.0.14.1+1-b2043.45 amd64
VM: Dynamic Code Evolution 64-Bit Server VM by JetBrains s.r.o.
Windows 10 10.0
.NET Framework 4.0.30319.42000
GC: G1 Young Generation, G1 Old Generation
Memory: 1500M
Cores: 8
Registry:
rdclient.asyncActions=false
ide.new.project.model.index.case.sensitivity=true
indexing.enable.entity.provider.based.indexing=false
Non-Bundled Plugins:
net.seesharpsoft.intellij.plugins.csv (2.18.2)
com.intellij.resharper.HeapAllocationsViewer (2022.1.0)
com.intellij.javafx (1.0.4)
com.intellij.ideolog (203.0.28.1)
avalonia-rider (1.0.0.2140933513)
com.jetbrains.rider.android (221.5591.20)
``` | 1.0 | Single EXE build takes minutes to launch, self contained build launches in seconds - ### Describe the bug
Links two different builds of the same program:
- Self contained, ready to run, win-x86 - [selfcontained.zip](https://drive.google.com/file/d/1ePBlypgj5QspcndbHw412vRMgWtbPDwo/view?usp=sharing)
- Single EXE, ready to run, win-86 - [singleexe.zip](https://drive.google.com/file/d/1VGUauy-8Q4G4_9qJq05cXaMJNxnCO_yk/view?usp=sharing)
Both programs run, however the single EXE version takes over two minutes to display the first screen. The self-contained version launches in seconds.
Builds are NOT trimmed.
Code can be found at https://github.com/mike-ward/Loon
### Further technical details
- Include the output of `dotnet --info`
```
► dotnet --info
.NET SDK (reflecting any global.json):
Version: 6.0.300
Commit: 8473146e7d
Runtime Environment:
OS Name: Windows
OS Version: 10.0.19043
OS Platform: Windows
RID: win10-x64
Base Path: C:\Program Files\dotnet\sdk\6.0.300\
Host (useful for support):
Version: 7.0.0-preview.1.22076.8
Commit: 405337939c
.NET SDKs installed:
2.2.207 [C:\Program Files\dotnet\sdk]
3.1.416 [C:\Program Files\dotnet\sdk]
6.0.101 [C:\Program Files\dotnet\sdk]
6.0.201 [C:\Program Files\dotnet\sdk]
6.0.300 [C:\Program Files\dotnet\sdk]
.NET runtimes installed:
Microsoft.AspNetCore.All 2.2.8 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.All]
Microsoft.AspNetCore.App 2.2.8 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.AspNetCore.App 3.1.22 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.AspNetCore.App 6.0.1 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.AspNetCore.App 6.0.3 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.NETCore.App 2.2.8 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.NETCore.App 3.1.22 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.NETCore.App 3.1.23 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.NETCore.App 5.0.14 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.NETCore.App 6.0.1 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.NETCore.App 6.0.3 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.NETCore.App 7.0.0-preview.1.22076.8 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.WindowsDesktop.App 3.1.22 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
Microsoft.WindowsDesktop.App 3.1.23 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
Microsoft.WindowsDesktop.App 5.0.14 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
Microsoft.WindowsDesktop.App 6.0.1 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
Microsoft.WindowsDesktop.App 6.0.3 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
```
- The IDE (VS / VS Code/ VS4Mac) you're running on, and its version
```
JetBrains Rider 2022.1.1
Build #RD-221.5591.20, built on April 28, 2022
Runtime version: 11.0.14.1+1-b2043.45 amd64
VM: Dynamic Code Evolution 64-Bit Server VM by JetBrains s.r.o.
Windows 10 10.0
.NET Framework 4.0.30319.42000
GC: G1 Young Generation, G1 Old Generation
Memory: 1500M
Cores: 8
Registry:
rdclient.asyncActions=false
ide.new.project.model.index.case.sensitivity=true
indexing.enable.entity.provider.based.indexing=false
Non-Bundled Plugins:
net.seesharpsoft.intellij.plugins.csv (2.18.2)
com.intellij.resharper.HeapAllocationsViewer (2022.1.0)
com.intellij.javafx (1.0.4)
com.intellij.ideolog (203.0.28.1)
avalonia-rider (1.0.0.2140933513)
com.jetbrains.rider.android (221.5591.20)
``` | non_priority | single exe build takes minutes to launch self contained build launches in seconds describe the bug links two different builds of the same program self contained ready to run win single exe ready to run win both programs run however the single exe version takes over two minutes to display the first screen the self contained version launches in seconds builds are not trimmed code can be found at further technical details include the output of dotnet info ► dotnet info net sdk reflecting any global json version commit runtime environment os name windows os version os platform windows rid base path c program files dotnet sdk host useful for support version preview commit net sdks installed net runtimes installed microsoft aspnetcore all microsoft aspnetcore app microsoft aspnetcore app microsoft aspnetcore app microsoft aspnetcore app microsoft aspnetcore app microsoft netcore app microsoft netcore app microsoft netcore app microsoft netcore app microsoft netcore app microsoft netcore app microsoft netcore app microsoft netcore app preview microsoft windowsdesktop app microsoft windowsdesktop app microsoft windowsdesktop app microsoft windowsdesktop app microsoft windowsdesktop app microsoft windowsdesktop app the ide vs vs code you re running on and its version jetbrains rider build rd built on april runtime version vm dynamic code evolution bit server vm by jetbrains s r o windows net framework gc young generation old generation memory cores registry rdclient asyncactions false ide new project model index case sensitivity true indexing enable entity provider based indexing false non bundled plugins net seesharpsoft intellij plugins csv com intellij resharper heapallocationsviewer com intellij javafx com intellij ideolog avalonia rider com jetbrains rider android | 0 |
177,534 | 21,478,663,310 | IssuesEvent | 2022-04-26 15:38:14 | tamirverthim/fitbit-api-example-java | https://api.github.com/repos/tamirverthim/fitbit-api-example-java | closed | CVE-2017-12597 High Severity Vulnerability detected by WhiteSource - autoclosed | security vulnerability | ## CVE-2017-12597 - High Severity Vulnerability
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-webmvc-4.3.2.RELEASE.jar</b></p></summary>
<p>Spring Web MVC</p>
<p>path: /root/.m2/repository/org/springframework/spring-webmvc/4.3.2.RELEASE/spring-webmvc-4.3.2.RELEASE.jar</p>
<p>
<p>Library home page: <a href=https://github.com/spring-projects/spring-framework>https://github.com/spring-projects/spring-framework</a></p>
Dependency Hierarchy:
- spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
- :x: **spring-webmvc-4.3.2.RELEASE.jar** (Vulnerable Library)
<p>Found in commit: <a href="https://github.com/tamirverthim/fitbit-api-example-java/commit/46d2ce7c36b9dd12bdeda63322ba7793eefcb0bb">46d2ce7c36b9dd12bdeda63322ba7793eefcb0bb</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
OpenCV (Open Source Computer Vision Library) through 3.3 has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread.
<p>Publish Date: 2017-08-07
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12597>CVE-2017-12597</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Change files</p>
<p>Origin: <a href="https://github.com/spring-projects/spring-framework/commit/e2d6e709c3c65a4951eb096843ee75d5200cfcad">https://github.com/spring-projects/spring-framework/commit/e2d6e709c3c65a4951eb096843ee75d5200cfcad</a></p>
<p>Release Date: 2016-12-21</p>
<p>Fix Resolution: Replace or update the following files: ResourceServletTests.java, ResourceServlet.java</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2017-12597 High Severity Vulnerability detected by WhiteSource - autoclosed - ## CVE-2017-12597 - High Severity Vulnerability
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-webmvc-4.3.2.RELEASE.jar</b></p></summary>
<p>Spring Web MVC</p>
<p>path: /root/.m2/repository/org/springframework/spring-webmvc/4.3.2.RELEASE/spring-webmvc-4.3.2.RELEASE.jar</p>
<p>
<p>Library home page: <a href=https://github.com/spring-projects/spring-framework>https://github.com/spring-projects/spring-framework</a></p>
Dependency Hierarchy:
- spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library)
- :x: **spring-webmvc-4.3.2.RELEASE.jar** (Vulnerable Library)
<p>Found in commit: <a href="https://github.com/tamirverthim/fitbit-api-example-java/commit/46d2ce7c36b9dd12bdeda63322ba7793eefcb0bb">46d2ce7c36b9dd12bdeda63322ba7793eefcb0bb</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
OpenCV (Open Source Computer Vision Library) through 3.3 has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread.
<p>Publish Date: 2017-08-07
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12597>CVE-2017-12597</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Change files</p>
<p>Origin: <a href="https://github.com/spring-projects/spring-framework/commit/e2d6e709c3c65a4951eb096843ee75d5200cfcad">https://github.com/spring-projects/spring-framework/commit/e2d6e709c3c65a4951eb096843ee75d5200cfcad</a></p>
<p>Release Date: 2016-12-21</p>
<p>Fix Resolution: Replace or update the following files: ResourceServletTests.java, ResourceServlet.java</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high severity vulnerability detected by whitesource autoclosed cve high severity vulnerability vulnerable library spring webmvc release jar spring web mvc path root repository org springframework spring webmvc release spring webmvc release jar library home page a href dependency hierarchy spring boot starter web release jar root library x spring webmvc release jar vulnerable library found in commit a href vulnerability details opencv open source computer vision library through has an out of bounds write error in the function in utils cpp when reading an image file by using cv imread publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type change files origin a href release date fix resolution replace or update the following files resourceservlettests java resourceservlet java step up your open source security game with whitesource | 0 |
331,772 | 24,325,429,356 | IssuesEvent | 2022-09-30 14:23:43 | connor-makowski/type_enforced | https://api.github.com/repos/connor-makowski/type_enforced | closed | Fix broken docstrings related to functools.partial | bug documentation | When using docstrings in classes and calling type_enforced, the headers for help strings get broken by functools.partial | 1.0 | Fix broken docstrings related to functools.partial - When using docstrings in classes and calling type_enforced, the headers for help strings get broken by functools.partial | non_priority | fix broken docstrings related to functools partial when using docstrings in classes and calling type enforced the headers for help strings get broken by functools partial | 0 |
82,170 | 32,038,554,837 | IssuesEvent | 2023-09-22 17:17:17 | SasView/sasview | https://api.github.com/repos/SasView/sasview | closed | better custom model error diagnostics (Trac #570) | Defect Major | When defining a custom model but having a bad parameter table, the custom model compile menu item claimed that the model loaded without difficulty. Similarly when there were errors in the C code for the model.
The compile button needs to run the model with some nominal value (e.g., Iq([0.1, 0.2, 0.3]) and Iqxy([0.1, 0.2, 0.3], [0.1, 0.2, 0.3]) to make sure that the model runs with the default parameters. Any errors returned by the compiler should be displayed.
Check that errors are captured and returned for bad opencl models on the various OpenCL environments (mac GPU, mac CPU, windows nvidia, windows radeon, windows intel) and for kerneldll under windows with the tcc compiler.
For pure python models, check that python code with Iq.vectorized=True but if statements in the code shows the correct errors.
These tests belong in the sasmodels package. Make sure that the appropriate compiler output gets captured as part of the test. The sasview gui only needs to demonstrate that bad output gets displayed to the user, but does not need to run the tests as part of the test suite.
Migrated from http://trac.sasview.org/ticket/570
```json
{
"status": "new",
"changetime": "2016-08-16T16:49:22",
"_ts": "2016-08-16 16:49:22.954125+00:00",
"description": "When defining a custom model but having a bad parameter table, the custom model compile menu item claimed that the model loaded without difficulty. Similarly when there were errors in the C code for the model.\n\nThe compile button needs to run the model with some nominal value (e.g., Iq([0.1, 0.2, 0.3]) and Iqxy([0.1, 0.2, 0.3], [0.1, 0.2, 0.3]) to make sure that the model runs with the default parameters. Any errors returned by the compiler should be displayed.\n\nCheck that errors are captured and returned for bad opencl models on the various OpenCL environments (mac GPU, mac CPU, windows nvidia, windows radeon, windows intel) and for kerneldll under windows with the tcc compiler.\n\nFor pure python models, check that python code with Iq.vectorized=True but if statements in the code shows the correct errors.\n\nThese tests belong in the sasmodels package. Make sure that the appropriate compiler output gets captured as part of the test. The sasview gui only needs to demonstrate that bad output gets displayed to the user, but does not need to run the tests as part of the test suite.\n",
"reporter": "pkienzle",
"cc": "",
"resolution": "",
"workpackage": "SasView Bug Fixing",
"time": "2016-05-03T21:13:02",
"component": "SasView",
"summary": "better custom model error diagnostics",
"priority": "major",
"keywords": "",
"milestone": "SasView Next Release +1",
"owner": "",
"type": "defect"
}
```
| 1.0 | better custom model error diagnostics (Trac #570) - When defining a custom model but having a bad parameter table, the custom model compile menu item claimed that the model loaded without difficulty. Similarly when there were errors in the C code for the model.
The compile button needs to run the model with some nominal value (e.g., Iq([0.1, 0.2, 0.3]) and Iqxy([0.1, 0.2, 0.3], [0.1, 0.2, 0.3]) to make sure that the model runs with the default parameters. Any errors returned by the compiler should be displayed.
Check that errors are captured and returned for bad opencl models on the various OpenCL environments (mac GPU, mac CPU, windows nvidia, windows radeon, windows intel) and for kerneldll under windows with the tcc compiler.
For pure python models, check that python code with Iq.vectorized=True but if statements in the code shows the correct errors.
These tests belong in the sasmodels package. Make sure that the appropriate compiler output gets captured as part of the test. The sasview gui only needs to demonstrate that bad output gets displayed to the user, but does not need to run the tests as part of the test suite.
Migrated from http://trac.sasview.org/ticket/570
```json
{
"status": "new",
"changetime": "2016-08-16T16:49:22",
"_ts": "2016-08-16 16:49:22.954125+00:00",
"description": "When defining a custom model but having a bad parameter table, the custom model compile menu item claimed that the model loaded without difficulty. Similarly when there were errors in the C code for the model.\n\nThe compile button needs to run the model with some nominal value (e.g., Iq([0.1, 0.2, 0.3]) and Iqxy([0.1, 0.2, 0.3], [0.1, 0.2, 0.3]) to make sure that the model runs with the default parameters. Any errors returned by the compiler should be displayed.\n\nCheck that errors are captured and returned for bad opencl models on the various OpenCL environments (mac GPU, mac CPU, windows nvidia, windows radeon, windows intel) and for kerneldll under windows with the tcc compiler.\n\nFor pure python models, check that python code with Iq.vectorized=True but if statements in the code shows the correct errors.\n\nThese tests belong in the sasmodels package. Make sure that the appropriate compiler output gets captured as part of the test. The sasview gui only needs to demonstrate that bad output gets displayed to the user, but does not need to run the tests as part of the test suite.\n",
"reporter": "pkienzle",
"cc": "",
"resolution": "",
"workpackage": "SasView Bug Fixing",
"time": "2016-05-03T21:13:02",
"component": "SasView",
"summary": "better custom model error diagnostics",
"priority": "major",
"keywords": "",
"milestone": "SasView Next Release +1",
"owner": "",
"type": "defect"
}
```
| non_priority | better custom model error diagnostics trac when defining a custom model but having a bad parameter table the custom model compile menu item claimed that the model loaded without difficulty similarly when there were errors in the c code for the model the compile button needs to run the model with some nominal value e g iq and iqxy to make sure that the model runs with the default parameters any errors returned by the compiler should be displayed check that errors are captured and returned for bad opencl models on the various opencl environments mac gpu mac cpu windows nvidia windows radeon windows intel and for kerneldll under windows with the tcc compiler for pure python models check that python code with iq vectorized true but if statements in the code shows the correct errors these tests belong in the sasmodels package make sure that the appropriate compiler output gets captured as part of the test the sasview gui only needs to demonstrate that bad output gets displayed to the user but does not need to run the tests as part of the test suite migrated from json status new changetime ts description when defining a custom model but having a bad parameter table the custom model compile menu item claimed that the model loaded without difficulty similarly when there were errors in the c code for the model n nthe compile button needs to run the model with some nominal value e g iq and iqxy to make sure that the model runs with the default parameters any errors returned by the compiler should be displayed n ncheck that errors are captured and returned for bad opencl models on the various opencl environments mac gpu mac cpu windows nvidia windows radeon windows intel and for kerneldll under windows with the tcc compiler n nfor pure python models check that python code with iq vectorized true but if statements in the code shows the correct errors n nthese tests belong in the sasmodels package make sure that the appropriate compiler output gets captured as part of the test the sasview gui only needs to demonstrate that bad output gets displayed to the user but does not need to run the tests as part of the test suite n reporter pkienzle cc resolution workpackage sasview bug fixing time component sasview summary better custom model error diagnostics priority major keywords milestone sasview next release owner type defect | 0 |
349,101 | 31,774,669,744 | IssuesEvent | 2023-09-12 13:47:50 | red-hat-storage/ocs-ci | https://api.github.com/repos/red-hat-storage/ocs-ci | opened | Test Mon Failures with In-Transit Encryption Tests Failing on Teardown | TestCase failing Squad/Green | Description:
During the execution of the "test_mon_failures_with_intransit_encryption" a test failure occurred during the teardown phase. The failure message indicates the following:
Test Name: test_mon_failures_with_intransit_encryption
Failure Message: "Failed on teardown with 'ocs_ci.ocs.exceptions.CephHealthException: Ceph cluster health is not OK. Health: HEALTH_WARN 1/3 mons down, quorum b,c'"
RUN ID: https://reportportal-ocs4.apps.ocp-c1.prod.psi.redhat.com/ui/#ocs/launches/465/13465/615439/615440/615441/log | 1.0 | Test Mon Failures with In-Transit Encryption Tests Failing on Teardown - Description:
During the execution of the "test_mon_failures_with_intransit_encryption" a test failure occurred during the teardown phase. The failure message indicates the following:
Test Name: test_mon_failures_with_intransit_encryption
Failure Message: "Failed on teardown with 'ocs_ci.ocs.exceptions.CephHealthException: Ceph cluster health is not OK. Health: HEALTH_WARN 1/3 mons down, quorum b,c'"
RUN ID: https://reportportal-ocs4.apps.ocp-c1.prod.psi.redhat.com/ui/#ocs/launches/465/13465/615439/615440/615441/log | non_priority | test mon failures with in transit encryption tests failing on teardown description during the execution of the test mon failures with intransit encryption a test failure occurred during the teardown phase the failure message indicates the following test name test mon failures with intransit encryption failure message failed on teardown with ocs ci ocs exceptions cephhealthexception ceph cluster health is not ok health health warn mons down quorum b c run id | 0 |
115,996 | 11,893,353,635 | IssuesEvent | 2020-03-29 11:09:41 | mtyn/polar | https://api.github.com/repos/mtyn/polar | closed | Vim screenshot shows in progress theme | documentation | The screenshot for vim shows colours that shouldn't be used in this theme. This has since been fixed, but the screenshot wasn't updated.
Fix the screenshot. | 1.0 | Vim screenshot shows in progress theme - The screenshot for vim shows colours that shouldn't be used in this theme. This has since been fixed, but the screenshot wasn't updated.
Fix the screenshot. | non_priority | vim screenshot shows in progress theme the screenshot for vim shows colours that shouldn t be used in this theme this has since been fixed but the screenshot wasn t updated fix the screenshot | 0 |
86,913 | 8,053,393,745 | IssuesEvent | 2018-08-01 22:48:07 | Microsoft/AzureStorageExplorer | https://api.github.com/repos/Microsoft/AzureStorageExplorer | closed | There is no prompt message after inputting Unicode characters for blob's properties | :white_check_mark: merged testing | **Storage Explorer Version**: 1.4.0
**Platform/OS Version**: Windows/Linux Ubuntu 16.04/Mac
**Architecture**: ia32/x64
**Build Number**:20180801.3
**Commit**: 7cdb5326
**Regression From**: Not a regression
#### Steps to Reproduce: ####
1. Expand one account -> Open a blob container which contains one blob at least.
2. Right click the blob then select 'Properties...'.
3. Input Unicode characters '非法字符' for one blob property like 'ContentEncoding'.
4. Check whether the prompt message displays or not.
#### Expected Experience: ####
It displays a prompt message after inputting Unicode characters for one blob's property.
#### Actual Experience: ####
No prompt message displays after inputting Unicode characters for one blob's property.
 | 1.0 | There is no prompt message after inputting Unicode characters for blob's properties - **Storage Explorer Version**: 1.4.0
**Platform/OS Version**: Windows/Linux Ubuntu 16.04/Mac
**Architecture**: ia32/x64
**Build Number**:20180801.3
**Commit**: 7cdb5326
**Regression From**: Not a regression
#### Steps to Reproduce: ####
1. Expand one account -> Open a blob container which contains one blob at least.
2. Right click the blob then select 'Properties...'.
3. Input Unicode characters '非法字符' for one blob property like 'ContentEncoding'.
4. Check whether the prompt message displays or not.
#### Expected Experience: ####
It displays a prompt message after inputting Unicode characters for one blob's property.
#### Actual Experience: ####
No prompt message displays after inputting Unicode characters for one blob's property.
 | non_priority | there is no prompt message after inputting unicode characters for blob s properties storage explorer version platform os version windows linux ubuntu mac architecture build number commit regression from not a regression steps to reproduce expand one account open a blob container which contains one blob at least right click the blob then select properties input unicode characters 非法字符 for one blob property like contentencoding check whether the prompt message displays or not expected experience it displays a prompt message after inputting unicode characters for one blob s property actual experience no prompt message displays after inputting unicode characters for one blob s property | 0 |
29,816 | 13,173,420,308 | IssuesEvent | 2020-08-11 20:17:08 | dockstore/dockstore | https://api.github.com/repos/dockstore/dockstore | closed | Galaxy subclass should be GALAXY in .dockstore.yml | bug review web-service | **Describe the bug**
To specify a Galaxy workflow in .dockstore.yml, you currently specify subclass `GXFORMAT2`. This is imprecise, because Dockstore is able to handle both the old and new formats of Galaxy workflows.
**Describe the solution you'd like**
Allow the subclass to be `GALAXY` in Dockstore workflows.
For backwards compatibiity, we should continue to support GXFORMAT2 in the .dockstore.yml
**Additional context**
See [this discusion](https://github.com/galaxyproject/training-material/pull/1990#discussion_r459577857).
- Webservice version: 1.9.0
- Platform: dockstore.org
┆Issue is synchronized with this [Jira Story](https://ucsc-cgl.atlassian.net/browse/DOCK-1510)
┆Issue Type: Story
┆Fix Versions: Dockstore 1.9.X
┆Sprint: Backlog
┆Issue Number: DOCK-1510
| 1.0 | Galaxy subclass should be GALAXY in .dockstore.yml - **Describe the bug**
To specify a Galaxy workflow in .dockstore.yml, you currently specify subclass `GXFORMAT2`. This is imprecise, because Dockstore is able to handle both the old and new formats of Galaxy workflows.
**Describe the solution you'd like**
Allow the subclass to be `GALAXY` in Dockstore workflows.
For backwards compatibiity, we should continue to support GXFORMAT2 in the .dockstore.yml
**Additional context**
See [this discusion](https://github.com/galaxyproject/training-material/pull/1990#discussion_r459577857).
- Webservice version: 1.9.0
- Platform: dockstore.org
┆Issue is synchronized with this [Jira Story](https://ucsc-cgl.atlassian.net/browse/DOCK-1510)
┆Issue Type: Story
┆Fix Versions: Dockstore 1.9.X
┆Sprint: Backlog
┆Issue Number: DOCK-1510
| non_priority | galaxy subclass should be galaxy in dockstore yml describe the bug to specify a galaxy workflow in dockstore yml you currently specify subclass this is imprecise because dockstore is able to handle both the old and new formats of galaxy workflows describe the solution you d like allow the subclass to be galaxy in dockstore workflows for backwards compatibiity we should continue to support in the dockstore yml additional context see webservice version platform dockstore org ┆issue is synchronized with this ┆issue type story ┆fix versions dockstore x ┆sprint backlog ┆issue number dock | 0 |
8,048 | 7,196,736,612 | IssuesEvent | 2018-02-05 05:18:05 | kolide/fleet | https://api.github.com/repos/kolide/fleet | closed | Add windows network information to cards | Feature: Infrastructure Good First Issue Help Wanted | Originally, we left off network information (IP address, MAC, etc) from host cards because the information wasn't available in osquery (https://github.com/facebook/osquery/issues/2907) but that is no longer the case. Let's add Windows detail queries to populate this information for Windows hosts. | 1.0 | Add windows network information to cards - Originally, we left off network information (IP address, MAC, etc) from host cards because the information wasn't available in osquery (https://github.com/facebook/osquery/issues/2907) but that is no longer the case. Let's add Windows detail queries to populate this information for Windows hosts. | non_priority | add windows network information to cards originally we left off network information ip address mac etc from host cards because the information wasn t available in osquery but that is no longer the case let s add windows detail queries to populate this information for windows hosts | 0 |
7,804 | 7,042,661,818 | IssuesEvent | 2017-12-30 16:21:32 | SimonKinds/4temps-tournament | https://api.github.com/repos/SimonKinds/4temps-tournament | closed | Create authorization middleware for express routes that checks if user is logged in | enhancement security | An example of how this can clean up code and make the code easier to read exists in `src/routes/tournament/index.js`
Currently these routes have a block of code like this
```js
if (req.session.user == null) {
res.sendStatus(401);
return;
}
```
This code duplication is not only bad because of the duplication, but also error-prone.
Instead a middleware should be selectively included in each route, which should block access to the route if the user is not logged in. | True | Create authorization middleware for express routes that checks if user is logged in - An example of how this can clean up code and make the code easier to read exists in `src/routes/tournament/index.js`
Currently these routes have a block of code like this
```js
if (req.session.user == null) {
res.sendStatus(401);
return;
}
```
This code duplication is not only bad because of the duplication, but also error-prone.
Instead a middleware should be selectively included in each route, which should block access to the route if the user is not logged in. | non_priority | create authorization middleware for express routes that checks if user is logged in an example of how this can clean up code and make the code easier to read exists in src routes tournament index js currently these routes have a block of code like this js if req session user null res sendstatus return this code duplication is not only bad because of the duplication but also error prone instead a middleware should be selectively included in each route which should block access to the route if the user is not logged in | 0 |
25,180 | 6,628,593,661 | IssuesEvent | 2017-09-23 19:59:32 | connected-web/gamebot | https://api.github.com/repos/connected-web/gamebot | closed | Add a command to view team mates | codenames suggestion | It would be nice if there was a command to remind who your team mates are - maybe something like 'who are my team?". Maybe the teams could be listed when calling 'game state' as well? | 1.0 | Add a command to view team mates - It would be nice if there was a command to remind who your team mates are - maybe something like 'who are my team?". Maybe the teams could be listed when calling 'game state' as well? | non_priority | add a command to view team mates it would be nice if there was a command to remind who your team mates are maybe something like who are my team maybe the teams could be listed when calling game state as well | 0 |
55,311 | 30,685,799,736 | IssuesEvent | 2023-07-26 12:17:08 | ArturGin/request_enforcer | https://api.github.com/repos/ArturGin/request_enforcer | opened | After adding gem, it takes a while to start the application | enhancement performance | It seems like Sniffer takes a while to load in | True | After adding gem, it takes a while to start the application - It seems like Sniffer takes a while to load in | non_priority | after adding gem it takes a while to start the application it seems like sniffer takes a while to load in | 0 |
67,051 | 8,071,061,593 | IssuesEvent | 2018-08-06 11:57:17 | PLUS-POSTECH/Owl | https://api.github.com/repos/PLUS-POSTECH/Owl | closed | Make owl-daemon DB aware of exploit test and dummy exploits | design new feature | 사용 케이스 중에 익스플로잇이 제대로 작동하는지 실험해보는 부분이 있는데, 이를 고려해서 DB 내역을 수정할 필요가 있습니다.
- [x] Fix migration schema
- [x] Update schema.rs
- [x] Update models.rs | 1.0 | Make owl-daemon DB aware of exploit test and dummy exploits - 사용 케이스 중에 익스플로잇이 제대로 작동하는지 실험해보는 부분이 있는데, 이를 고려해서 DB 내역을 수정할 필요가 있습니다.
- [x] Fix migration schema
- [x] Update schema.rs
- [x] Update models.rs | non_priority | make owl daemon db aware of exploit test and dummy exploits 사용 케이스 중에 익스플로잇이 제대로 작동하는지 실험해보는 부분이 있는데 이를 고려해서 db 내역을 수정할 필요가 있습니다 fix migration schema update schema rs update models rs | 0 |
12,210 | 9,597,377,952 | IssuesEvent | 2019-05-09 21:07:40 | Azure/azure-sdk-for-net | https://api.github.com/repos/Azure/azure-sdk-for-net | closed | [Service Bus Client] Rename test environment variable | Client Service Bus | For consistency, @jsquire and I agreed to use the environment variable `SERVICE_BUS_CONNECTION_STRING` for all Service Bus tests in all languages. In this repo, the variable should be renamed from `AZ_SERVICE_BUS_CONNECTION` to `SERVICE_BUS_CONNECTION_STRING`.
Related: https://github.com/Azure/azure-sdk-for-js/issues/2471 | 1.0 | [Service Bus Client] Rename test environment variable - For consistency, @jsquire and I agreed to use the environment variable `SERVICE_BUS_CONNECTION_STRING` for all Service Bus tests in all languages. In this repo, the variable should be renamed from `AZ_SERVICE_BUS_CONNECTION` to `SERVICE_BUS_CONNECTION_STRING`.
Related: https://github.com/Azure/azure-sdk-for-js/issues/2471 | non_priority | rename test environment variable for consistency jsquire and i agreed to use the environment variable service bus connection string for all service bus tests in all languages in this repo the variable should be renamed from az service bus connection to service bus connection string related | 0 |
104,508 | 11,412,577,257 | IssuesEvent | 2020-02-01 14:09:39 | oscrud/oscrud | https://api.github.com/repos/oscrud/oscrud | closed | Transport | documentation | # Feature
* Event-Driven
* Lookup-able routing
* Path-based routing
# Integration
* Go-HTTP
* SocketIO
* Echo
# Example
* Integration API
* Example of Integration
* Example of Registering Transport | 1.0 | Transport - # Feature
* Event-Driven
* Lookup-able routing
* Path-based routing
# Integration
* Go-HTTP
* SocketIO
* Echo
# Example
* Integration API
* Example of Integration
* Example of Registering Transport | non_priority | transport feature event driven lookup able routing path based routing integration go http socketio echo example integration api example of integration example of registering transport | 0 |
37,467 | 15,301,411,428 | IssuesEvent | 2021-02-24 13:35:14 | wellcomecollection/platform | https://api.github.com/repos/wellcomecollection/platform | closed | Storage service shouldn't return a 500 error if you ask for a malformed external identifier | 🐛 Bug 📦 Storage service | If you request external identifier `a.b` from the bags API, you get a 500 error. That's because it gets an IllegalArgumentException, thrown when you try to construct the ExternalIdentifier. | 1.0 | Storage service shouldn't return a 500 error if you ask for a malformed external identifier - If you request external identifier `a.b` from the bags API, you get a 500 error. That's because it gets an IllegalArgumentException, thrown when you try to construct the ExternalIdentifier. | non_priority | storage service shouldn t return a error if you ask for a malformed external identifier if you request external identifier a b from the bags api you get a error that s because it gets an illegalargumentexception thrown when you try to construct the externalidentifier | 0 |
4,692 | 3,427,996,174 | IssuesEvent | 2015-12-10 06:31:45 | angular/angular | https://api.github.com/repos/angular/angular | closed | flaky perf test on Firefox | comp: build/dev-productivity type: bug | This is currently the most common flake that I know of, can we disable the test on FF or do something else to prevent it from failing the builds several times a day?
```
Failures:
1) firefox extension should measure performance
Message:
Expected false to be truthy.
Stack:
Error: Failed expectation
at assertEventsContainsName (benchpress/test/firefox_extension/spec.ts:13:17)
at benchpress/test/firefox_extension/spec.ts:32:11
at Array.forEach (native)
at process._tickCallback (node.js:366:9)
2 specs, 1 failure
Finished in 132.347 seconds
Shutting down selenium standalone server.
[launcher] 0 instance(s) of WebDriver still running
[launcher] firefox #1 failed 1 test(s)
[launcher] overall: 1 failed spec(s)
[launcher] Process exited with error code 1
+killServer
+kill 3378
The command "./scripts/ci/build_and_test.sh ${MODE}" exited with 1.
``` | 1.0 | flaky perf test on Firefox - This is currently the most common flake that I know of, can we disable the test on FF or do something else to prevent it from failing the builds several times a day?
```
Failures:
1) firefox extension should measure performance
Message:
Expected false to be truthy.
Stack:
Error: Failed expectation
at assertEventsContainsName (benchpress/test/firefox_extension/spec.ts:13:17)
at benchpress/test/firefox_extension/spec.ts:32:11
at Array.forEach (native)
at process._tickCallback (node.js:366:9)
2 specs, 1 failure
Finished in 132.347 seconds
Shutting down selenium standalone server.
[launcher] 0 instance(s) of WebDriver still running
[launcher] firefox #1 failed 1 test(s)
[launcher] overall: 1 failed spec(s)
[launcher] Process exited with error code 1
+killServer
+kill 3378
The command "./scripts/ci/build_and_test.sh ${MODE}" exited with 1.
``` | non_priority | flaky perf test on firefox this is currently the most common flake that i know of can we disable the test on ff or do something else to prevent it from failing the builds several times a day failures firefox extension should measure performance message expected false to be truthy stack error failed expectation at asserteventscontainsname benchpress test firefox extension spec ts at benchpress test firefox extension spec ts at array foreach native at process tickcallback node js specs failure finished in seconds shutting down selenium standalone server instance s of webdriver still running firefox failed test s overall failed spec s process exited with error code killserver kill the command scripts ci build and test sh mode exited with | 0 |
27,820 | 6,905,184,710 | IssuesEvent | 2017-11-27 05:25:21 | cs340tabyu/cs340Fall2017 | https://api.github.com/repos/cs340tabyu/cs340Fall2017 | closed | Mismatch in player stats (train cars) | P3: Affects Gameplay Section 2 The Jedi Coders | 

Differing number displayed of Red Player TrainCars between two clients. Unsure of what the server has. Possibly related to Claimed Route Errors (subtracting trains even when route not claimed) | 1.0 | Mismatch in player stats (train cars) - 

Differing number displayed of Red Player TrainCars between two clients. Unsure of what the server has. Possibly related to Claimed Route Errors (subtracting trains even when route not claimed) | non_priority | mismatch in player stats train cars differing number displayed of red player traincars between two clients unsure of what the server has possibly related to claimed route errors subtracting trains even when route not claimed | 0 |
28,456 | 11,634,679,319 | IssuesEvent | 2020-02-28 10:51:01 | solid/user-stories | https://api.github.com/repos/solid/user-stories | reopened | As a pod provider I'd like to see aggregated histories of access attempts to pods I host so that I can manage hotspots, charge per usage, prevent DoS attacks, etc. | Auditing Security | This may raise issues of privacy (e.g. for individual pod owners), but I think this needs to be balanced with the legitimate needs of the pod provider to effectively manage the infrastructure they provide for pod hosting (hence I mention in the title the possibly of the provider only having 'aggregated histories' of access, and perhaps not the level of detail that the individual pod owners may have).
Perhaps a pod provider could offer differing levels of infrastructure support to pod owners based on the degree of visibility the pod owner consents to provide to the pod-hosting provider.
#11 | True | As a pod provider I'd like to see aggregated histories of access attempts to pods I host so that I can manage hotspots, charge per usage, prevent DoS attacks, etc. - This may raise issues of privacy (e.g. for individual pod owners), but I think this needs to be balanced with the legitimate needs of the pod provider to effectively manage the infrastructure they provide for pod hosting (hence I mention in the title the possibly of the provider only having 'aggregated histories' of access, and perhaps not the level of detail that the individual pod owners may have).
Perhaps a pod provider could offer differing levels of infrastructure support to pod owners based on the degree of visibility the pod owner consents to provide to the pod-hosting provider.
#11 | non_priority | as a pod provider i d like to see aggregated histories of access attempts to pods i host so that i can manage hotspots charge per usage prevent dos attacks etc this may raise issues of privacy e g for individual pod owners but i think this needs to be balanced with the legitimate needs of the pod provider to effectively manage the infrastructure they provide for pod hosting hence i mention in the title the possibly of the provider only having aggregated histories of access and perhaps not the level of detail that the individual pod owners may have perhaps a pod provider could offer differing levels of infrastructure support to pod owners based on the degree of visibility the pod owner consents to provide to the pod hosting provider | 0 |
107,798 | 16,762,314,727 | IssuesEvent | 2021-06-14 01:36:28 | benlazarine/status-site | https://api.github.com/repos/benlazarine/status-site | opened | WS-2017-3772 (High) detected in underscore.string-3.2.3.tgz | security vulnerability | ## WS-2017-3772 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>underscore.string-3.2.3.tgz</b></p></summary>
<p>String manipulation extensions for Underscore.js javascript library.</p>
<p>Library home page: <a href="https://registry.npmjs.org/underscore.string/-/underscore.string-3.2.3.tgz">https://registry.npmjs.org/underscore.string/-/underscore.string-3.2.3.tgz</a></p>
<p>Path to dependency file: status-site/package.json</p>
<p>Path to vulnerable library: status-site/node_modules/grunt-legacy-log/node_modules/underscore.string/package.json</p>
<p>
Dependency Hierarchy:
- sails-0.12.14.tgz (Root Library)
- grunt-1.0.1.tgz
- grunt-legacy-util-1.0.0.tgz
- :x: **underscore.string-3.2.3.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Regular Expression Denial of Service (ReDoS) vulnerability was found in underscore.string 2.4.0 through 3.3.5.
<p>Publish Date: 2017-09-08
<p>URL: <a href=https://github.com/esamattis/underscore.string/issues/510>WS-2017-3772</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2017-3772 (High) detected in underscore.string-3.2.3.tgz - ## WS-2017-3772 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>underscore.string-3.2.3.tgz</b></p></summary>
<p>String manipulation extensions for Underscore.js javascript library.</p>
<p>Library home page: <a href="https://registry.npmjs.org/underscore.string/-/underscore.string-3.2.3.tgz">https://registry.npmjs.org/underscore.string/-/underscore.string-3.2.3.tgz</a></p>
<p>Path to dependency file: status-site/package.json</p>
<p>Path to vulnerable library: status-site/node_modules/grunt-legacy-log/node_modules/underscore.string/package.json</p>
<p>
Dependency Hierarchy:
- sails-0.12.14.tgz (Root Library)
- grunt-1.0.1.tgz
- grunt-legacy-util-1.0.0.tgz
- :x: **underscore.string-3.2.3.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Regular Expression Denial of Service (ReDoS) vulnerability was found in underscore.string 2.4.0 through 3.3.5.
<p>Publish Date: 2017-09-08
<p>URL: <a href=https://github.com/esamattis/underscore.string/issues/510>WS-2017-3772</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | ws high detected in underscore string tgz ws high severity vulnerability vulnerable library underscore string tgz string manipulation extensions for underscore js javascript library library home page a href path to dependency file status site package json path to vulnerable library status site node modules grunt legacy log node modules underscore string package json dependency hierarchy sails tgz root library grunt tgz grunt legacy util tgz x underscore string tgz vulnerable library vulnerability details regular expression denial of service redos vulnerability was found in underscore string through publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href step up your open source security game with whitesource | 0 |
117,027 | 15,039,041,262 | IssuesEvent | 2021-02-02 18:09:21 | pekrau/notebooks | https://api.github.com/repos/pekrau/notebooks | closed | Should expansion of note tree display be remembered? | design question | Write into index.json file: "expanded" = [...] | 1.0 | Should expansion of note tree display be remembered? - Write into index.json file: "expanded" = [...] | non_priority | should expansion of note tree display be remembered write into index json file expanded | 0 |
39,488 | 10,345,858,644 | IssuesEvent | 2019-09-04 14:15:16 | haskell/haskell-ide-engine | https://api.github.com/repos/haskell/haskell-ide-engine | closed | Cannot do cabal 3.0 build for 8.6.5 | build good first issue os: linux os: windows | Trying to install `cabal-hie-8.6.5` gives me the following error instead:
```
Warning: Failed to build documentation for haddock-api-2.22.0 (which is
required by test:wrapper-test from haskell-ide-engine-0.9.0.0, test:unit-test
from haskell-ide-engine-0.9.0.0 and others).
# stack (for cabal-hie-8.6.5)
# cabal (for cabal-hie-8.6.5)
cabal: unrecognized 'new-install' option
`--symlink-bindir=/home/annaia/.local/bin'
Error when running Shake build system:
at src/Development/Shake/Internal/Args.hs:81:69-79:
* Depends on: cabal-hie-8.6.5
* Raised the exception:
user error (Development.Shake.command_, system command failed
Command: cabal new-install --write-ghc-environment-files=never --symlink-bindir=/home/annaia/.local/bin exe:hie --overwrite-policy=always
Exit code: 1
Stderr:
cabal: unrecognized 'new-install' option
`--symlink-bindir=/home/annaia/.local/bin'
)
```
I have ghc-8.6.5 and cabal 3.0 installed locally so I'm presuming this is because somehow the stack temp cabal isn't the right version?
Anyway to fix this or is there something I'm missing? | 1.0 | Cannot do cabal 3.0 build for 8.6.5 - Trying to install `cabal-hie-8.6.5` gives me the following error instead:
```
Warning: Failed to build documentation for haddock-api-2.22.0 (which is
required by test:wrapper-test from haskell-ide-engine-0.9.0.0, test:unit-test
from haskell-ide-engine-0.9.0.0 and others).
# stack (for cabal-hie-8.6.5)
# cabal (for cabal-hie-8.6.5)
cabal: unrecognized 'new-install' option
`--symlink-bindir=/home/annaia/.local/bin'
Error when running Shake build system:
at src/Development/Shake/Internal/Args.hs:81:69-79:
* Depends on: cabal-hie-8.6.5
* Raised the exception:
user error (Development.Shake.command_, system command failed
Command: cabal new-install --write-ghc-environment-files=never --symlink-bindir=/home/annaia/.local/bin exe:hie --overwrite-policy=always
Exit code: 1
Stderr:
cabal: unrecognized 'new-install' option
`--symlink-bindir=/home/annaia/.local/bin'
)
```
I have ghc-8.6.5 and cabal 3.0 installed locally so I'm presuming this is because somehow the stack temp cabal isn't the right version?
Anyway to fix this or is there something I'm missing? | non_priority | cannot do cabal build for trying to install cabal hie gives me the following error instead warning failed to build documentation for haddock api which is required by test wrapper test from haskell ide engine test unit test from haskell ide engine and others stack for cabal hie cabal for cabal hie cabal unrecognized new install option symlink bindir home annaia local bin error when running shake build system at src development shake internal args hs depends on cabal hie raised the exception user error development shake command system command failed command cabal new install write ghc environment files never symlink bindir home annaia local bin exe hie overwrite policy always exit code stderr cabal unrecognized new install option symlink bindir home annaia local bin i have ghc and cabal installed locally so i m presuming this is because somehow the stack temp cabal isn t the right version anyway to fix this or is there something i m missing | 0 |
92,314 | 18,820,429,126 | IssuesEvent | 2021-11-10 07:34:15 | redhat-developer/vscode-openshift-tools | https://api.github.com/repos/redhat-developer/vscode-openshift-tools | closed | Provide filters for started/not started clusters | resolution/wontfix kind/feature upstream/vscode-k8s-tools | in my case, I have a lot of clusters registered, only one is started and I need to scroll to find it

instead of filter it might also be 2 top-level tree nodes.
nota having a marker to mention if it started or not would be nice too in case of filter (not useful if grouped in different node tree)
| 1.0 | Provide filters for started/not started clusters - in my case, I have a lot of clusters registered, only one is started and I need to scroll to find it

instead of filter it might also be 2 top-level tree nodes.
nota having a marker to mention if it started or not would be nice too in case of filter (not useful if grouped in different node tree)
| non_priority | provide filters for started not started clusters in my case i have a lot of clusters registered only one is started and i need to scroll to find it instead of filter it might also be top level tree nodes nota having a marker to mention if it started or not would be nice too in case of filter not useful if grouped in different node tree | 0 |
9,237 | 3,869,861,936 | IssuesEvent | 2016-04-10 21:02:33 | wevote/WebApp | https://api.github.com/repos/wevote/WebApp | closed | Mobile display too wide, iPhone Safari | code review | - [x] Many pages are too wide (and offer left/right scrolling) in an iPhone 6 in Safari. (Note: I think our minimum phone width should be iPhone 5) These include Ballot, Candidate, More Opinions
- [x] "1 positive (up arrow)" and "0 negative (down arrow)" should fit on one line (See attached photos, for both ballot page and candidate page)
- [x] We can reduce the candidate photo to ~66% of the current size when in mobile mode.


| 1.0 | Mobile display too wide, iPhone Safari - - [x] Many pages are too wide (and offer left/right scrolling) in an iPhone 6 in Safari. (Note: I think our minimum phone width should be iPhone 5) These include Ballot, Candidate, More Opinions
- [x] "1 positive (up arrow)" and "0 negative (down arrow)" should fit on one line (See attached photos, for both ballot page and candidate page)
- [x] We can reduce the candidate photo to ~66% of the current size when in mobile mode.


| non_priority | mobile display too wide iphone safari many pages are too wide and offer left right scrolling in an iphone in safari note i think our minimum phone width should be iphone these include ballot candidate more opinions positive up arrow and negative down arrow should fit on one line see attached photos for both ballot page and candidate page we can reduce the candidate photo to of the current size when in mobile mode | 0 |
233,764 | 19,044,247,418 | IssuesEvent | 2021-11-25 04:37:47 | systemd/systemd | https://api.github.com/repos/systemd/systemd | closed | Spurious fails in TEST-46-HOMED | bug 🐛 tests homed ci-blocker 🚧 | **systemd version the issue has been seen with**
> latest master
<!-- **NOTE:** Do not submit bug reports about anything but the two most recently released *major* systemd versions upstream! -->
<!-- If there have been multiple stable releases for that major version, please consider updating to a recent one before reporting an issue. -->
<!-- When using a distro package, please make sure that the version reported is meaningful for upstream. -->
<!-- See https://github.com/systemd/systemd-stable/releases for the list of most recent releases. -->
<!-- For older version please use distribution trackers (see https://systemd.io/CONTRIBUTING#filing-issues). -->
**Used distribution**
> Arch Linux
In several latest CentOS CI results I noticed an intermittent fail in TEST-46-HOMED:
```
[ 45.107852] testsuite-46.sh[246]: + diff -I '^\s*Disk \(Size\|Free\|Floor\|Ceiling\):' /tmp/a /tmp/b
[ 45.108536] testsuite-46.sh[246]: + rm /tmp/a /tmp/b
[ 45.111213] testsuite-46.sh[246]: + SYSTEMD_LOG_LEVEL=debug
[ 45.111213] testsuite-46.sh[246]: + PASSWORD=yPN4N0fYNKUkOq
[ 45.111213] testsuite-46.sh[246]: + NEWPASSWORD=xEhErW0ndafV4s
[ 45.111213] testsuite-46.sh[246]: + homectl passwd test-user
[ 45.118581] homectl[471]: Bus n/a: changing state UNSET → OPENING
[ 45.119274] homectl[471]: sd-bus: starting bus by connecting to /run/dbus/system_bus_socket...
[ 45.119401] homectl[471]: Bus n/a: changing state OPENING → AUTHENTICATING
[ 45.120167] homectl[471]: Bus n/a: changing state AUTHENTICATING → HELLO
[ 45.120278] homectl[471]: Sent message type=method_call sender=n/a destination=org.freedesktop.DBus path=/org/freedesktop/DBus interface=org.freedesktop.DBus member=Hello cookie=1 reply_cookie=0 signature=n/a error-name=n/a error-messa>
[ 45.121201] homectl[471]: Got message type=method_return sender=org.freedesktop.DBus destination=:1.16 path=n/a interface=n/a member=n/a cookie=1 reply_cookie=1 signature=s error-name=n/a error-message=n/a
[ 45.121329] homectl[471]: Bus n/a: changing state HELLO → RUNNING
[ 45.121737] homectl[471]: Sent message type=method_call sender=n/a destination=org.freedesktop.home1 path=/org/freedesktop/home1 interface=org.freedesktop.home1.Manager member=ChangePasswordHome cookie=2 reply_cookie=0 signature=sss er>
[ 45.235877] systemd-homed[223]: test-user: changing state active → passwd-while-active
[ 46.396633] systemd-homework[472]: No valid password for LUKS superblock.
[ 48.259199] systemd-homed[223]: Change operation failed: Required key not available
[ 48.259619] systemd-homed[223]: test-user: changing state passwd-while-active → active
[ 48.259818] homectl[471]: Got message type=error sender=:1.0 destination=:1.16 path=n/a interface=n/a member=n/a cookie=114 reply_cookie=2 signature=s error-name=org.freedesktop.home1.BadPassword error-message=Password for home test-us>
[ 48.262588] homectl[471]: Sent message type=method_call sender=n/a destination=org.freedesktop.home1 path=/org/freedesktop/home1 interface=org.freedesktop.home1.Manager member=ChangePasswordHome cookie=3 reply_cookie=0 signature=sss er>
[ 48.482874] systemd-homed[223]: test-user: changing state active → passwd-while-active
[ 50.521386] systemd-homework[473]: Discovered used LUKS device /dev/mapper/home-test-user, and validated password.
[ 50.640260] systemd-homework[473]: Successfully re-activated LUKS device.
[ 50.735247] systemd-homework[473]: Provided password unlocks user record.
[ 50.735633] systemd-homework[473]: Discovered used loopback device /dev/loop0.
[ 50.735796] systemd-homework[473]: Failed to open .identity file in home directory: Permission denied
[ 50.739144] systemd-homed[223]: Change operation failed: Permission denied
[ 50.739691] systemd-homed[223]: test-user: changing state passwd-while-active → active
[ 50.739796] homectl[471]: Got message type=error sender=:1.0 destination=:1.16 path=n/a interface=n/a member=n/a cookie=117 reply_cookie=3 signature=s error-name=org.freedesktop.DBus.Error.AccessDenied error-message=Failed to execute o>
[ 50.740123] homectl[471]: Operation on home test-user failed: Access denied
[ 50.740241] homectl[471]: Bus n/a: changing state RUNNING → CLOSED
```
Full journal: [system.journal.tar.gz](https://github.com/systemd/systemd/files/7569109/system.journal.tar.gz)
/cc @poettering | 1.0 | Spurious fails in TEST-46-HOMED - **systemd version the issue has been seen with**
> latest master
<!-- **NOTE:** Do not submit bug reports about anything but the two most recently released *major* systemd versions upstream! -->
<!-- If there have been multiple stable releases for that major version, please consider updating to a recent one before reporting an issue. -->
<!-- When using a distro package, please make sure that the version reported is meaningful for upstream. -->
<!-- See https://github.com/systemd/systemd-stable/releases for the list of most recent releases. -->
<!-- For older version please use distribution trackers (see https://systemd.io/CONTRIBUTING#filing-issues). -->
**Used distribution**
> Arch Linux
In several latest CentOS CI results I noticed an intermittent fail in TEST-46-HOMED:
```
[ 45.107852] testsuite-46.sh[246]: + diff -I '^\s*Disk \(Size\|Free\|Floor\|Ceiling\):' /tmp/a /tmp/b
[ 45.108536] testsuite-46.sh[246]: + rm /tmp/a /tmp/b
[ 45.111213] testsuite-46.sh[246]: + SYSTEMD_LOG_LEVEL=debug
[ 45.111213] testsuite-46.sh[246]: + PASSWORD=yPN4N0fYNKUkOq
[ 45.111213] testsuite-46.sh[246]: + NEWPASSWORD=xEhErW0ndafV4s
[ 45.111213] testsuite-46.sh[246]: + homectl passwd test-user
[ 45.118581] homectl[471]: Bus n/a: changing state UNSET → OPENING
[ 45.119274] homectl[471]: sd-bus: starting bus by connecting to /run/dbus/system_bus_socket...
[ 45.119401] homectl[471]: Bus n/a: changing state OPENING → AUTHENTICATING
[ 45.120167] homectl[471]: Bus n/a: changing state AUTHENTICATING → HELLO
[ 45.120278] homectl[471]: Sent message type=method_call sender=n/a destination=org.freedesktop.DBus path=/org/freedesktop/DBus interface=org.freedesktop.DBus member=Hello cookie=1 reply_cookie=0 signature=n/a error-name=n/a error-messa>
[ 45.121201] homectl[471]: Got message type=method_return sender=org.freedesktop.DBus destination=:1.16 path=n/a interface=n/a member=n/a cookie=1 reply_cookie=1 signature=s error-name=n/a error-message=n/a
[ 45.121329] homectl[471]: Bus n/a: changing state HELLO → RUNNING
[ 45.121737] homectl[471]: Sent message type=method_call sender=n/a destination=org.freedesktop.home1 path=/org/freedesktop/home1 interface=org.freedesktop.home1.Manager member=ChangePasswordHome cookie=2 reply_cookie=0 signature=sss er>
[ 45.235877] systemd-homed[223]: test-user: changing state active → passwd-while-active
[ 46.396633] systemd-homework[472]: No valid password for LUKS superblock.
[ 48.259199] systemd-homed[223]: Change operation failed: Required key not available
[ 48.259619] systemd-homed[223]: test-user: changing state passwd-while-active → active
[ 48.259818] homectl[471]: Got message type=error sender=:1.0 destination=:1.16 path=n/a interface=n/a member=n/a cookie=114 reply_cookie=2 signature=s error-name=org.freedesktop.home1.BadPassword error-message=Password for home test-us>
[ 48.262588] homectl[471]: Sent message type=method_call sender=n/a destination=org.freedesktop.home1 path=/org/freedesktop/home1 interface=org.freedesktop.home1.Manager member=ChangePasswordHome cookie=3 reply_cookie=0 signature=sss er>
[ 48.482874] systemd-homed[223]: test-user: changing state active → passwd-while-active
[ 50.521386] systemd-homework[473]: Discovered used LUKS device /dev/mapper/home-test-user, and validated password.
[ 50.640260] systemd-homework[473]: Successfully re-activated LUKS device.
[ 50.735247] systemd-homework[473]: Provided password unlocks user record.
[ 50.735633] systemd-homework[473]: Discovered used loopback device /dev/loop0.
[ 50.735796] systemd-homework[473]: Failed to open .identity file in home directory: Permission denied
[ 50.739144] systemd-homed[223]: Change operation failed: Permission denied
[ 50.739691] systemd-homed[223]: test-user: changing state passwd-while-active → active
[ 50.739796] homectl[471]: Got message type=error sender=:1.0 destination=:1.16 path=n/a interface=n/a member=n/a cookie=117 reply_cookie=3 signature=s error-name=org.freedesktop.DBus.Error.AccessDenied error-message=Failed to execute o>
[ 50.740123] homectl[471]: Operation on home test-user failed: Access denied
[ 50.740241] homectl[471]: Bus n/a: changing state RUNNING → CLOSED
```
Full journal: [system.journal.tar.gz](https://github.com/systemd/systemd/files/7569109/system.journal.tar.gz)
/cc @poettering | non_priority | spurious fails in test homed systemd version the issue has been seen with latest master used distribution arch linux in several latest centos ci results i noticed an intermittent fail in test homed testsuite sh diff i s disk size free floor ceiling tmp a tmp b testsuite sh rm tmp a tmp b testsuite sh systemd log level debug testsuite sh password testsuite sh newpassword testsuite sh homectl passwd test user homectl bus n a changing state unset → opening homectl sd bus starting bus by connecting to run dbus system bus socket homectl bus n a changing state opening → authenticating homectl bus n a changing state authenticating → hello homectl sent message type method call sender n a destination org freedesktop dbus path org freedesktop dbus interface org freedesktop dbus member hello cookie reply cookie signature n a error name n a error messa homectl got message type method return sender org freedesktop dbus destination path n a interface n a member n a cookie reply cookie signature s error name n a error message n a homectl bus n a changing state hello → running homectl sent message type method call sender n a destination org freedesktop path org freedesktop interface org freedesktop manager member changepasswordhome cookie reply cookie signature sss er systemd homed test user changing state active → passwd while active systemd homework no valid password for luks superblock systemd homed change operation failed required key not available systemd homed test user changing state passwd while active → active homectl got message type error sender destination path n a interface n a member n a cookie reply cookie signature s error name org freedesktop badpassword error message password for home test us homectl sent message type method call sender n a destination org freedesktop path org freedesktop interface org freedesktop manager member changepasswordhome cookie reply cookie signature sss er systemd homed test user changing state active → passwd while active systemd homework discovered used luks device dev mapper home test user and validated password systemd homework successfully re activated luks device systemd homework provided password unlocks user record systemd homework discovered used loopback device dev systemd homework failed to open identity file in home directory permission denied systemd homed change operation failed permission denied systemd homed test user changing state passwd while active → active homectl got message type error sender destination path n a interface n a member n a cookie reply cookie signature s error name org freedesktop dbus error accessdenied error message failed to execute o homectl operation on home test user failed access denied homectl bus n a changing state running → closed full journal cc poettering | 0 |
65,548 | 12,619,533,483 | IssuesEvent | 2020-06-13 01:04:59 | asartalo/ctse | https://api.github.com/repos/asartalo/ctse | closed | Fix "method_lines" issue in lib/Session.js | code-quality | Function `_objectify` has 31 lines of code (exceeds 25 allowed). Consider refactoring.
https://codeclimate.com/github/asartalo/ctse/lib/Session.js#issue_5ee2aaef02a4580001000046 | 1.0 | Fix "method_lines" issue in lib/Session.js - Function `_objectify` has 31 lines of code (exceeds 25 allowed). Consider refactoring.
https://codeclimate.com/github/asartalo/ctse/lib/Session.js#issue_5ee2aaef02a4580001000046 | non_priority | fix method lines issue in lib session js function objectify has lines of code exceeds allowed consider refactoring | 0 |
76,804 | 9,965,830,825 | IssuesEvent | 2019-07-08 09:40:22 | tidyverse/dplyr | https://api.github.com/repos/tidyverse/dplyr | closed | Documentation of NA types (NA_real_, etc.) in recode function | documentation help wanted :heart: tidy-dev-day :nerd_face: | I was reading issue #3202, which relates to the need to use the correct type of NA on the RHS of the case_when function (i.e. NA_real_, NA_character_) etc. The author indicated that they have never heard of different types of NA and I hadn't either. They opened a PR to add an example to the documentation.
I think I'm observing the same type of issue with recode and I wondered if you would like me to open a PR for the documentation for that, too? NA_character_ appears once in the current documentation but it doesn't really say anything specific about matching up the types. Just thought it would be a bit clearer for people like me.
``` r
library(dplyr)
#>
#> Attaching package: 'dplyr'
#> The following objects are masked from 'package:stats':
#>
#> filter, lag
#> The following objects are masked from 'package:base':
#>
#> intersect, setdiff, setequal, union
starwars %>%
select(name:mass, gender, species) %>%
mutate(
gender = recode(gender, "male" = 1, "female" = 2, .default = NA)
)
#> Error in mutate_impl(.data, dots): Evaluation error: `.default` must be type double, not logical.
```
Created on 2018-08-23 by the [reprex package](http://reprex.tidyverse.org) (v0.2.0). | 1.0 | Documentation of NA types (NA_real_, etc.) in recode function - I was reading issue #3202, which relates to the need to use the correct type of NA on the RHS of the case_when function (i.e. NA_real_, NA_character_) etc. The author indicated that they have never heard of different types of NA and I hadn't either. They opened a PR to add an example to the documentation.
I think I'm observing the same type of issue with recode and I wondered if you would like me to open a PR for the documentation for that, too? NA_character_ appears once in the current documentation but it doesn't really say anything specific about matching up the types. Just thought it would be a bit clearer for people like me.
``` r
library(dplyr)
#>
#> Attaching package: 'dplyr'
#> The following objects are masked from 'package:stats':
#>
#> filter, lag
#> The following objects are masked from 'package:base':
#>
#> intersect, setdiff, setequal, union
starwars %>%
select(name:mass, gender, species) %>%
mutate(
gender = recode(gender, "male" = 1, "female" = 2, .default = NA)
)
#> Error in mutate_impl(.data, dots): Evaluation error: `.default` must be type double, not logical.
```
Created on 2018-08-23 by the [reprex package](http://reprex.tidyverse.org) (v0.2.0). | non_priority | documentation of na types na real etc in recode function i was reading issue which relates to the need to use the correct type of na on the rhs of the case when function i e na real na character etc the author indicated that they have never heard of different types of na and i hadn t either they opened a pr to add an example to the documentation i think i m observing the same type of issue with recode and i wondered if you would like me to open a pr for the documentation for that too na character appears once in the current documentation but it doesn t really say anything specific about matching up the types just thought it would be a bit clearer for people like me r library dplyr attaching package dplyr the following objects are masked from package stats filter lag the following objects are masked from package base intersect setdiff setequal union starwars select name mass gender species mutate gender recode gender male female default na error in mutate impl data dots evaluation error default must be type double not logical created on by the | 0 |
26,748 | 4,241,331,102 | IssuesEvent | 2016-07-06 16:00:14 | Shopify/sarama | https://api.github.com/repos/Shopify/sarama | closed | Check the received message value in producer mocks | enhancement producer tests | Hi guys, not sure if this is a valid issue.
When developing a unit test for a program that uses the sync/asyc producer, I can only say that I expect to receive a message and that I want the mock response to be success/error.
For my test I need to check the value inside the message, so I propose to extend the `producerExpectation struct` in mocks.go and to add new methods to the producer mock, that receive in input a string (regexp) and check the received value against this regexp.
I am ok to propose an implementation if it makes sense. | 1.0 | Check the received message value in producer mocks - Hi guys, not sure if this is a valid issue.
When developing a unit test for a program that uses the sync/asyc producer, I can only say that I expect to receive a message and that I want the mock response to be success/error.
For my test I need to check the value inside the message, so I propose to extend the `producerExpectation struct` in mocks.go and to add new methods to the producer mock, that receive in input a string (regexp) and check the received value against this regexp.
I am ok to propose an implementation if it makes sense. | non_priority | check the received message value in producer mocks hi guys not sure if this is a valid issue when developing a unit test for a program that uses the sync asyc producer i can only say that i expect to receive a message and that i want the mock response to be success error for my test i need to check the value inside the message so i propose to extend the producerexpectation struct in mocks go and to add new methods to the producer mock that receive in input a string regexp and check the received value against this regexp i am ok to propose an implementation if it makes sense | 0 |
166,538 | 26,371,046,675 | IssuesEvent | 2023-01-11 20:42:49 | elementor/elementor | https://api.github.com/repos/elementor/elementor | closed | ✔️ 🔗 🚀 Feature Request: A more flexible section with auto-width columns (Related to #2219) | request/enhancement type/responsive component/layout component/design solved_by_container 🚀 shipped solved_by_custom_units | <!-- Before opening a new issue, please search for duplicate issues to prevent opening a duplicate feature request. If there is already an open existing request, please leave a comment there. -->
## Prerequisites
<!-- MARK COMPLETED ITEMS WITH AN [x] -->
- [x] I have searched for similar features requests in both open and closed tickets and cannot find a duplicate.
- [x] The feature is still missing in the latest stable version of Elementor ( Elementor Pro. )
**What problem is your feature request going to solve? Please describe.**
**My request**
Option to make a section more flexible where the columns take no more space than they require instead of fixed percentage
**The issue**
Let's say you full width section with 3 columns, in this case a header. The structure is
[LOGO] [MENU------------------] [LOGIN]
So you add a section with 3 columns, and you can set their percentages, let's say 20% 60%, 20%;
Within the logo column, I add the logo image however I don't want to set the image to have percentage width as it may be too big on some screens and too small on others. I want a fixed logo image width.
But if I do so, the logo image will (most of the time) be smaller or bigger than the logo column depending on screen width.
If it's smaller, that creates empty space between the logo and the menu
[LOGO**/////**] [MENU------------------] [LOGIN]
**Describe the solution you'd like**
The solution I propose is, add an option to each section which when enabled sets each child column to width: auto;
```
.elementor-row > .elementor-column {
width: auto;
}
```
Add an additional option to control the behaviour of the columns with flexbox e.g center, left, right, space-between, space-around.
```
.elementor-row {
justify-content: space-between; /*center, left, right, space-between, space-around.*/
}
```
You could also add flex-grow option for each column
| 1.0 | ✔️ 🔗 🚀 Feature Request: A more flexible section with auto-width columns (Related to #2219) - <!-- Before opening a new issue, please search for duplicate issues to prevent opening a duplicate feature request. If there is already an open existing request, please leave a comment there. -->
## Prerequisites
<!-- MARK COMPLETED ITEMS WITH AN [x] -->
- [x] I have searched for similar features requests in both open and closed tickets and cannot find a duplicate.
- [x] The feature is still missing in the latest stable version of Elementor ( Elementor Pro. )
**What problem is your feature request going to solve? Please describe.**
**My request**
Option to make a section more flexible where the columns take no more space than they require instead of fixed percentage
**The issue**
Let's say you full width section with 3 columns, in this case a header. The structure is
[LOGO] [MENU------------------] [LOGIN]
So you add a section with 3 columns, and you can set their percentages, let's say 20% 60%, 20%;
Within the logo column, I add the logo image however I don't want to set the image to have percentage width as it may be too big on some screens and too small on others. I want a fixed logo image width.
But if I do so, the logo image will (most of the time) be smaller or bigger than the logo column depending on screen width.
If it's smaller, that creates empty space between the logo and the menu
[LOGO**/////**] [MENU------------------] [LOGIN]
**Describe the solution you'd like**
The solution I propose is, add an option to each section which when enabled sets each child column to width: auto;
```
.elementor-row > .elementor-column {
width: auto;
}
```
Add an additional option to control the behaviour of the columns with flexbox e.g center, left, right, space-between, space-around.
```
.elementor-row {
justify-content: space-between; /*center, left, right, space-between, space-around.*/
}
```
You could also add flex-grow option for each column
| non_priority | ✔️ 🔗 🚀 feature request a more flexible section with auto width columns related to prerequisites i have searched for similar features requests in both open and closed tickets and cannot find a duplicate the feature is still missing in the latest stable version of elementor elementor pro what problem is your feature request going to solve please describe my request option to make a section more flexible where the columns take no more space than they require instead of fixed percentage the issue let s say you full width section with columns in this case a header the structure is so you add a section with columns and you can set their percentages let s say within the logo column i add the logo image however i don t want to set the image to have percentage width as it may be too big on some screens and too small on others i want a fixed logo image width but if i do so the logo image will most of the time be smaller or bigger than the logo column depending on screen width if it s smaller that creates empty space between the logo and the menu describe the solution you d like the solution i propose is add an option to each section which when enabled sets each child column to width auto elementor row elementor column width auto add an additional option to control the behaviour of the columns with flexbox e g center left right space between space around elementor row justify content space between center left right space between space around you could also add flex grow option for each column | 0 |
12,197 | 4,386,539,829 | IssuesEvent | 2016-08-08 13:11:35 | ColinGilbert/noobwerkz-engine | https://api.github.com/repos/ColinGilbert/noobwerkz-engine | closed | Banish -fpermissive | best practices bug code correctness perpetual security stability | Having this thing is useful in a pinch, but a horror in production code that allows certain awful things right through. | 1.0 | Banish -fpermissive - Having this thing is useful in a pinch, but a horror in production code that allows certain awful things right through. | non_priority | banish fpermissive having this thing is useful in a pinch but a horror in production code that allows certain awful things right through | 0 |
6,276 | 3,006,833,090 | IssuesEvent | 2015-07-27 13:09:48 | centresource/generator-playbook | https://api.github.com/repos/centresource/generator-playbook | closed | Add upgrade instructions? | documentation question | Should we consider adding some documentation on how to upgrade an existing project from v1 to v2?
Maybe the wiki is a good place for this. | 1.0 | Add upgrade instructions? - Should we consider adding some documentation on how to upgrade an existing project from v1 to v2?
Maybe the wiki is a good place for this. | non_priority | add upgrade instructions should we consider adding some documentation on how to upgrade an existing project from to maybe the wiki is a good place for this | 0 |
18,311 | 6,574,378,138 | IssuesEvent | 2017-09-11 12:40:08 | pioneerspacesim/pioneer | https://api.github.com/repos/pioneerspacesim/pioneer | closed | macOS build failure due to ARFLAGS | Build Platform Specific | ```
Making install in miniz
make[3]: Nothing to be done for `install-exec-am'.
make[3]: Nothing to be done for `install-data-am'.
Making install in jenkins
CC lookup3.o
AR libjenkins.a
/Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/ar: illegal option -- j
usage: ar -d [-TLsv] archive file ...
ar -m [-TLsv] archive file ...
ar -m [-abiTLsv] position archive file ...
ar -p [-TLsv] archive [file ...]
ar -q [-cTLsv] archive file ...
ar -r [-cuTLsv] archive file ...
ar -r [-abciuTLsv] position archive file ...
ar -t [-TLsv] archive [file ...]
ar -x [-ouTLsv] archive [file ...]
make[2]: *** [libjenkins.a] Error 1
make[1]: *** [install-recursive] Error 1
make: *** [install-recursive] Error 1
```
This is what happens if I remove
```
ENV["ARFLAGS"] = "cru"
```
from the Homebrew formula.
The comment in the formula says:
```
# Remove as soon as possible
# https://github.com/pioneerspacesim/pioneer/issues/3839
```
But https://github.com/pioneerspacesim/pioneer/issues/3839 is apparently closed (via https://github.com/pioneerspacesim/pioneer/pull/3987) and yet the problem remains.
https://jenkins.brew.sh/job/Homebrew%20Core%20Pull%20Requests/6489/version=sierra/console | 1.0 | macOS build failure due to ARFLAGS - ```
Making install in miniz
make[3]: Nothing to be done for `install-exec-am'.
make[3]: Nothing to be done for `install-data-am'.
Making install in jenkins
CC lookup3.o
AR libjenkins.a
/Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/ar: illegal option -- j
usage: ar -d [-TLsv] archive file ...
ar -m [-TLsv] archive file ...
ar -m [-abiTLsv] position archive file ...
ar -p [-TLsv] archive [file ...]
ar -q [-cTLsv] archive file ...
ar -r [-cuTLsv] archive file ...
ar -r [-abciuTLsv] position archive file ...
ar -t [-TLsv] archive [file ...]
ar -x [-ouTLsv] archive [file ...]
make[2]: *** [libjenkins.a] Error 1
make[1]: *** [install-recursive] Error 1
make: *** [install-recursive] Error 1
```
This is what happens if I remove
```
ENV["ARFLAGS"] = "cru"
```
from the Homebrew formula.
The comment in the formula says:
```
# Remove as soon as possible
# https://github.com/pioneerspacesim/pioneer/issues/3839
```
But https://github.com/pioneerspacesim/pioneer/issues/3839 is apparently closed (via https://github.com/pioneerspacesim/pioneer/pull/3987) and yet the problem remains.
https://jenkins.brew.sh/job/Homebrew%20Core%20Pull%20Requests/6489/version=sierra/console | non_priority | macos build failure due to arflags making install in miniz make nothing to be done for install exec am make nothing to be done for install data am making install in jenkins cc o ar libjenkins a applications xcode app contents developer toolchains xcodedefault xctoolchain usr bin ar illegal option j usage ar d archive file ar m archive file ar m position archive file ar p archive ar q archive file ar r archive file ar r position archive file ar t archive ar x archive make error make error make error this is what happens if i remove env cru from the homebrew formula the comment in the formula says remove as soon as possible but is apparently closed via and yet the problem remains | 0 |
105,381 | 9,081,711,324 | IssuesEvent | 2019-02-17 04:31:36 | phan/phan | https://api.github.com/repos/phan/phan | closed | "Serialization of 'Closure' is not allowed" exception running unit tests of Phan | tests | Noticed when fixing phpunit xml configurations.
Recording this because Phan frequently uses static closures for performance reasons and some fail to be added to the test cases' ` protected $backupStaticAttributesBlacklist`
This was due to the $closure_map (src/Phan/AST/ASTReverter.php on line 71)
Steps used to track down which closure was the cause:
```
# install a build of PHP with debugging symbols (i.e. configured with `CFLAGS=-g`) and use that
» gdb -args `which php` vendor/bin/phpunit
...
(gdb) b zend_class_serialize_deny
Breakpoint 1 at 0x9fa880
...
(gdb) run
Starting program: /path/to/php-7.3.1-dev-nts-install/bin/php vendor/bin/phpunit
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
PHPUnit 6.5.14 by Sebastian Bergmann and contributors.
............................................................. 61 / 1315 ( 4%)
............................................................. 122 / 1315 ( 9%)
............................................................. 183 / 1315 ( 13%)
............................................................. 244 / 1315 ( 18%)
............................................................. 305 / 1315 ( 23%)
............................................................. 366 / 1315 ( 27%)
............................................................. 427 / 1315 ( 32%)
............................................................. 488 / 1315 ( 37%)
............................................................. 549 / 1315 ( 41%)
............................................................. 610 / 1315 ( 46%)
............................................................. 671 / 1315 ( 51%)
............................................................. 732 / 1315 ( 55%)
............................................................. 793 / 1315 ( 60%)
............................................................. 854 / 1315 ( 64%)
............................................................. 915 / 1315 ( 69%)
............................................................. 976 / 1315 ( 74%)
............................................................. 1037 / 1315 ( 78%)
............................................................. 1098 / 1315 ( 83%)
............................................SSSSSSSSSSSSSSSSS 1159 / 1315 ( 88%)
SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS........ 1220 / 1315 ( 92%)
............................................................. 1281 / 1315 ( 97%)
.....................
Breakpoint 1, 0x00000000009fa880 in zend_class_serialize_deny ()
(gdb) bt
#0 0x00000000009fa880 in zend_class_serialize_deny ()
#1 0x00000000008f4e6d in php_var_serialize_intern.part ()
#2 0x00000000008f5695 in php_var_serialize_intern.part ()
#3 0x00000000008f96b8 in php_var_serialize ()
#4 0x00000000008f9815 in zif_serialize ()
#5 0x0000000000a74bff in execute_ex ()
#6 0x0000000000a7f8d6 in zend_execute ()
#7 0x00000000009dbc30 in zend_execute_scripts ()
#8 0x0000000000970938 in php_execute_script ()
#9 0x0000000000a824f9 in do_cli ()
#10 0x000000000045f56c in main ()
(gdb) set $func = ((zend_closure*)object->value.obj)->func
(gdb) print (char*) ($func->op_array.filename)->val
$1 = 0x7fffe916f818 "/path/to/phan/src/Phan/AST/ASTReverter.php"
(gdb) print $func->op_array.line_start
$2 = 71
``` | 1.0 | "Serialization of 'Closure' is not allowed" exception running unit tests of Phan - Noticed when fixing phpunit xml configurations.
Recording this because Phan frequently uses static closures for performance reasons and some fail to be added to the test cases' ` protected $backupStaticAttributesBlacklist`
This was due to the $closure_map (src/Phan/AST/ASTReverter.php on line 71)
Steps used to track down which closure was the cause:
```
# install a build of PHP with debugging symbols (i.e. configured with `CFLAGS=-g`) and use that
» gdb -args `which php` vendor/bin/phpunit
...
(gdb) b zend_class_serialize_deny
Breakpoint 1 at 0x9fa880
...
(gdb) run
Starting program: /path/to/php-7.3.1-dev-nts-install/bin/php vendor/bin/phpunit
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
PHPUnit 6.5.14 by Sebastian Bergmann and contributors.
............................................................. 61 / 1315 ( 4%)
............................................................. 122 / 1315 ( 9%)
............................................................. 183 / 1315 ( 13%)
............................................................. 244 / 1315 ( 18%)
............................................................. 305 / 1315 ( 23%)
............................................................. 366 / 1315 ( 27%)
............................................................. 427 / 1315 ( 32%)
............................................................. 488 / 1315 ( 37%)
............................................................. 549 / 1315 ( 41%)
............................................................. 610 / 1315 ( 46%)
............................................................. 671 / 1315 ( 51%)
............................................................. 732 / 1315 ( 55%)
............................................................. 793 / 1315 ( 60%)
............................................................. 854 / 1315 ( 64%)
............................................................. 915 / 1315 ( 69%)
............................................................. 976 / 1315 ( 74%)
............................................................. 1037 / 1315 ( 78%)
............................................................. 1098 / 1315 ( 83%)
............................................SSSSSSSSSSSSSSSSS 1159 / 1315 ( 88%)
SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS........ 1220 / 1315 ( 92%)
............................................................. 1281 / 1315 ( 97%)
.....................
Breakpoint 1, 0x00000000009fa880 in zend_class_serialize_deny ()
(gdb) bt
#0 0x00000000009fa880 in zend_class_serialize_deny ()
#1 0x00000000008f4e6d in php_var_serialize_intern.part ()
#2 0x00000000008f5695 in php_var_serialize_intern.part ()
#3 0x00000000008f96b8 in php_var_serialize ()
#4 0x00000000008f9815 in zif_serialize ()
#5 0x0000000000a74bff in execute_ex ()
#6 0x0000000000a7f8d6 in zend_execute ()
#7 0x00000000009dbc30 in zend_execute_scripts ()
#8 0x0000000000970938 in php_execute_script ()
#9 0x0000000000a824f9 in do_cli ()
#10 0x000000000045f56c in main ()
(gdb) set $func = ((zend_closure*)object->value.obj)->func
(gdb) print (char*) ($func->op_array.filename)->val
$1 = 0x7fffe916f818 "/path/to/phan/src/Phan/AST/ASTReverter.php"
(gdb) print $func->op_array.line_start
$2 = 71
``` | non_priority | serialization of closure is not allowed exception running unit tests of phan noticed when fixing phpunit xml configurations recording this because phan frequently uses static closures for performance reasons and some fail to be added to the test cases protected backupstaticattributesblacklist this was due to the closure map src phan ast astreverter php on line steps used to track down which closure was the cause install a build of php with debugging symbols i e configured with cflags g and use that » gdb args which php vendor bin phpunit gdb b zend class serialize deny breakpoint at gdb run starting program path to php dev nts install bin php vendor bin phpunit using host libthread db library lib linux gnu libthread db so phpunit by sebastian bergmann and contributors sssssssssssssssss sssssssssssssssssssssssssssssssssssssssssssssssssssss breakpoint in zend class serialize deny gdb bt in zend class serialize deny in php var serialize intern part in php var serialize intern part in php var serialize in zif serialize in execute ex in zend execute in zend execute scripts in php execute script in do cli in main gdb set func zend closure object value obj func gdb print char func op array filename val path to phan src phan ast astreverter php gdb print func op array line start | 0 |
146,622 | 11,741,863,624 | IssuesEvent | 2020-03-11 22:52:36 | rancher/rancher | https://api.github.com/repos/rancher/rancher | closed | [k3s-upgrade] Workload-apply-k3s-worker-plan stuck while upgrading cluster from v1.16.3 to v1.16.7. | [zube]: To Test area/import-k3s kind/bug-qa | <!--
Please search for existing issues first, then read https://rancher.com/docs/rancher/v2.x/en/contributing/#bugs-issues-or-questions to see what we expect in an issue
For security issues, please email security@rancher.com instead of posting a public issue in GitHub. You may (but are not required to) use the GPG key located on Keybase.
-->
**What kind of request is this (question/bug/enhancement/feature request):**
Bug
**Steps to reproduce (least amount of steps as possible):**
1. Import a k3s cluster with version v1.16.3 (1 master node, 2 worker nodes)
2. Upgrade the cluster to v1.16.7 (Drain server/worker node being false and concurrency being 1)
**Result:**
Cluster -> system -> Workload -> apply-k3s-worker-plan one of the pods is stuck in initialization state.
<img width="924" alt="Screen Shot 2020-03-09 at 11 01 58 AM" src="https://user-images.githubusercontent.com/60111667/76247417-c1d78000-61fc-11ea-9ad8-e566fec43647.png">
<img width="1023" alt="Screen Shot 2020-03-09 at 11 10 05 AM" src="https://user-images.githubusercontent.com/60111667/76247773-504c0180-61fd-11ea-8b53-bc5fae38441c.png">
**Other details that may be helpful:**
**Environment information**
- Rancher version (`rancher/rancher`/`rancher/server` image tag or shown bottom left in the UI): master-2399-head - 926997017
- Installation option (single install/HA): Single
| 1.0 | [k3s-upgrade] Workload-apply-k3s-worker-plan stuck while upgrading cluster from v1.16.3 to v1.16.7. - <!--
Please search for existing issues first, then read https://rancher.com/docs/rancher/v2.x/en/contributing/#bugs-issues-or-questions to see what we expect in an issue
For security issues, please email security@rancher.com instead of posting a public issue in GitHub. You may (but are not required to) use the GPG key located on Keybase.
-->
**What kind of request is this (question/bug/enhancement/feature request):**
Bug
**Steps to reproduce (least amount of steps as possible):**
1. Import a k3s cluster with version v1.16.3 (1 master node, 2 worker nodes)
2. Upgrade the cluster to v1.16.7 (Drain server/worker node being false and concurrency being 1)
**Result:**
Cluster -> system -> Workload -> apply-k3s-worker-plan one of the pods is stuck in initialization state.
<img width="924" alt="Screen Shot 2020-03-09 at 11 01 58 AM" src="https://user-images.githubusercontent.com/60111667/76247417-c1d78000-61fc-11ea-9ad8-e566fec43647.png">
<img width="1023" alt="Screen Shot 2020-03-09 at 11 10 05 AM" src="https://user-images.githubusercontent.com/60111667/76247773-504c0180-61fd-11ea-8b53-bc5fae38441c.png">
**Other details that may be helpful:**
**Environment information**
- Rancher version (`rancher/rancher`/`rancher/server` image tag or shown bottom left in the UI): master-2399-head - 926997017
- Installation option (single install/HA): Single
| non_priority | workload apply worker plan stuck while upgrading cluster from to please search for existing issues first then read to see what we expect in an issue for security issues please email security rancher com instead of posting a public issue in github you may but are not required to use the gpg key located on keybase what kind of request is this question bug enhancement feature request bug steps to reproduce least amount of steps as possible import a cluster with version master node worker nodes upgrade the cluster to drain server worker node being false and concurrency being result cluster system workload apply worker plan one of the pods is stuck in initialization state img width alt screen shot at am src img width alt screen shot at am src other details that may be helpful environment information rancher version rancher rancher rancher server image tag or shown bottom left in the ui master head installation option single install ha single | 0 |
104,103 | 16,613,422,334 | IssuesEvent | 2021-06-02 14:07:25 | Thanraj/linux-4.1.15 | https://api.github.com/repos/Thanraj/linux-4.1.15 | opened | CVE-2017-18079 (High) detected in linux-stable-rtv4.1.33 | security vulnerability | ## CVE-2017-18079 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://api.github.com/repos/Thanraj/linux-4.1.15/commits/5e3fb3e332499e1ad10a0969e55582af1027b085">5e3fb3e332499e1ad10a0969e55582af1027b085</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>linux-4.1.15/drivers/input/serio/i8042.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>linux-4.1.15/drivers/input/serio/i8042.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port->exists value can change after it is validated.
<p>Publish Date: 2018-01-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18079>CVE-2017-18079</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-18079">https://nvd.nist.gov/vuln/detail/CVE-2017-18079</a></p>
<p>Release Date: 2018-01-29</p>
<p>Fix Resolution: 4.12.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2017-18079 (High) detected in linux-stable-rtv4.1.33 - ## CVE-2017-18079 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://api.github.com/repos/Thanraj/linux-4.1.15/commits/5e3fb3e332499e1ad10a0969e55582af1027b085">5e3fb3e332499e1ad10a0969e55582af1027b085</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>linux-4.1.15/drivers/input/serio/i8042.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>linux-4.1.15/drivers/input/serio/i8042.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port->exists value can change after it is validated.
<p>Publish Date: 2018-01-29
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18079>CVE-2017-18079</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-18079">https://nvd.nist.gov/vuln/detail/CVE-2017-18079</a></p>
<p>Release Date: 2018-01-29</p>
<p>Fix Resolution: 4.12.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in linux stable cve high severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files linux drivers input serio c linux drivers input serio c vulnerability details drivers input serio c in the linux kernel before allows attackers to cause a denial of service null pointer dereference and system crash or possibly have unspecified other impact because the port exists value can change after it is validated publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
13,562 | 16,081,114,093 | IssuesEvent | 2021-04-26 04:50:12 | WordPress/gutenberg | https://api.github.com/repos/WordPress/gutenberg | opened | Disabling block widgets via theme supports wipes out content | Backwards Compatibility [Feature] Widgets Customizer [Feature] Widgets Screen [Package] Edit Widgets [Type] Bug | <!--
Please fill out ALL required sections. Bug reports with missing information will
be closed.
Before submitting a bug report:
- Check if the bug has already been fixed by updating WordPress and/or Gutenberg.
- Check if the bug is caused by a plugin by deactivating all plugins except Gutenberg.
- Check if the bug is caused by a theme by activating a default theme e.g. Twenty Twenty.
- Check if the bug has already been reported by searching https://github.com/WordPress/gutenberg/issues.
If this is a security issue, please report it in HackerOne instead:
https://hackerone.com/wordpress
-->
## Description
When adding `remove_theme_support( 'widgets-block-editor' );` to TT1's `functions.php` after using the block editor to add some blocks to widget areas, all content is lost and I cannot see the blocks I added. Optin back in, by removing the opt out code does _not_ bring back the content.
## Step-by-step reproduction instructions
1. Have Gutenberg `trunk`
2. Change your theme to TwentyTwentyOne
3. Go to Appearance > Widgets
4. Add some blocks (eg a heading and an image)
5. Save
5. Go to Appearance > Customizer
6. Add another block
7. Publish
8. Check the blocks you added appear in the theme's footer sidebar
9. Go to Appearance > Theme editor
10. Edit the theme's `functions.php` file
11. At the end of `twenty_twenty_one_setup` add `remove_theme_support( 'widgets-block-editor' );`;
12. Save
13. Go to Dashboard
14. Go to Appearance > Widgets
15. Notice the classic screens shows up
16. **No block in the the footer sidebar**
## Expected behaviour
I expect all content remains no matter how many times I switch between optin in and opting out.
## Actual behaviour
Content (blocks and legacy widgets) is lost when opting out of the `widgets-block-editor` supprt.
| True | Disabling block widgets via theme supports wipes out content - <!--
Please fill out ALL required sections. Bug reports with missing information will
be closed.
Before submitting a bug report:
- Check if the bug has already been fixed by updating WordPress and/or Gutenberg.
- Check if the bug is caused by a plugin by deactivating all plugins except Gutenberg.
- Check if the bug is caused by a theme by activating a default theme e.g. Twenty Twenty.
- Check if the bug has already been reported by searching https://github.com/WordPress/gutenberg/issues.
If this is a security issue, please report it in HackerOne instead:
https://hackerone.com/wordpress
-->
## Description
When adding `remove_theme_support( 'widgets-block-editor' );` to TT1's `functions.php` after using the block editor to add some blocks to widget areas, all content is lost and I cannot see the blocks I added. Optin back in, by removing the opt out code does _not_ bring back the content.
## Step-by-step reproduction instructions
1. Have Gutenberg `trunk`
2. Change your theme to TwentyTwentyOne
3. Go to Appearance > Widgets
4. Add some blocks (eg a heading and an image)
5. Save
5. Go to Appearance > Customizer
6. Add another block
7. Publish
8. Check the blocks you added appear in the theme's footer sidebar
9. Go to Appearance > Theme editor
10. Edit the theme's `functions.php` file
11. At the end of `twenty_twenty_one_setup` add `remove_theme_support( 'widgets-block-editor' );`;
12. Save
13. Go to Dashboard
14. Go to Appearance > Widgets
15. Notice the classic screens shows up
16. **No block in the the footer sidebar**
## Expected behaviour
I expect all content remains no matter how many times I switch between optin in and opting out.
## Actual behaviour
Content (blocks and legacy widgets) is lost when opting out of the `widgets-block-editor` supprt.
| non_priority | disabling block widgets via theme supports wipes out content please fill out all required sections bug reports with missing information will be closed before submitting a bug report check if the bug has already been fixed by updating wordpress and or gutenberg check if the bug is caused by a plugin by deactivating all plugins except gutenberg check if the bug is caused by a theme by activating a default theme e g twenty twenty check if the bug has already been reported by searching if this is a security issue please report it in hackerone instead description when adding remove theme support widgets block editor to s functions php after using the block editor to add some blocks to widget areas all content is lost and i cannot see the blocks i added optin back in by removing the opt out code does not bring back the content step by step reproduction instructions have gutenberg trunk change your theme to twentytwentyone go to appearance widgets add some blocks eg a heading and an image save go to appearance customizer add another block publish check the blocks you added appear in the theme s footer sidebar go to appearance theme editor edit the theme s functions php file at the end of twenty twenty one setup add remove theme support widgets block editor save go to dashboard go to appearance widgets notice the classic screens shows up no block in the the footer sidebar expected behaviour i expect all content remains no matter how many times i switch between optin in and opting out actual behaviour content blocks and legacy widgets is lost when opting out of the widgets block editor supprt | 0 |
49,521 | 26,189,353,423 | IssuesEvent | 2023-01-03 07:08:30 | thesofproject/sof | https://api.github.com/repos/thesofproject/sof | closed | [FEATURE] Setup performance build to evaluate each pipeline/task performance. | enhancement performance | We want to measure the SOF performance in 3 dimensions. This would benefit new platform/feature enabling, core assignment and other topics.
- [ ] **Memory**: break down the whole memory usage of SOF, include TEXT/DATA/BSS.
Plan:
1. a dedicated map file for all TEXT/DATA/BSS and its details for each linked component.
this is not done yet.
2. each pipeline buffer allocation status during running.
maybe can get this info from fw logs, if there is other way, please tell.
3. based on 1 & 2 & memory.h data, you will know where is the big cost and then try to optimize it.
- [ ] **Performance**: get performance (MCPS) of each task/pipeline .
Plan: Get the cost of each task/stage, then add together to get performance of the whole pipeline(s).
- [ ] **Power Consumption**: Get power data for HIFI DSP. Check and determine each DSP core frequency under different FW loading. Power data is directly related to DSP freq. With performance data, it's possible to adjust DSP freq.
Plan: Need HW instrument to measure power data under different DSP freq.
According to Liam, after get performance data, IPG team may adjust DSP frequency for power saving.
| True | [FEATURE] Setup performance build to evaluate each pipeline/task performance. - We want to measure the SOF performance in 3 dimensions. This would benefit new platform/feature enabling, core assignment and other topics.
- [ ] **Memory**: break down the whole memory usage of SOF, include TEXT/DATA/BSS.
Plan:
1. a dedicated map file for all TEXT/DATA/BSS and its details for each linked component.
this is not done yet.
2. each pipeline buffer allocation status during running.
maybe can get this info from fw logs, if there is other way, please tell.
3. based on 1 & 2 & memory.h data, you will know where is the big cost and then try to optimize it.
- [ ] **Performance**: get performance (MCPS) of each task/pipeline .
Plan: Get the cost of each task/stage, then add together to get performance of the whole pipeline(s).
- [ ] **Power Consumption**: Get power data for HIFI DSP. Check and determine each DSP core frequency under different FW loading. Power data is directly related to DSP freq. With performance data, it's possible to adjust DSP freq.
Plan: Need HW instrument to measure power data under different DSP freq.
According to Liam, after get performance data, IPG team may adjust DSP frequency for power saving.
| non_priority | setup performance build to evaluate each pipeline task performance we want to measure the sof performance in dimensions this would benefit new platform feature enabling core assignment and other topics memory break down the whole memory usage of sof include text data bss plan a dedicated map file for all text data bss and its details for each linked component this is not done yet each pipeline buffer allocation status during running maybe can get this info from fw logs if there is other way please tell based on memory h data you will know where is the big cost and then try to optimize it performance get performance mcps of each task pipeline plan get the cost of each task stage then add together to get performance of the whole pipeline s power consumption get power data for hifi dsp check and determine each dsp core frequency under different fw loading power data is directly related to dsp freq with performance data it s possible to adjust dsp freq plan need hw instrument to measure power data under different dsp freq according to liam after get performance data ipg team may adjust dsp frequency for power saving | 0 |
232,794 | 18,909,443,788 | IssuesEvent | 2021-11-16 12:39:48 | IgniteUI/igniteui-webcomponents | https://api.github.com/repos/IgniteUI/igniteui-webcomponents | closed | Button - Bootstrap Theme - When theme is applied, button does not look like a bootstrap button | bug status: awaiting-test | ## Description
When the bootstrap theme is applied, the button component does not look like a bootstrap button.
Here is what the bootstrap buttons look like depending on which button style (primary, secondary, success, etc) they use:

Here is what the igc-button looks like when the bootstrap theme is applied

## Steps to reproduce
1. Run story board
2. Apply bootstrap theme
3. Observe the button
## Result
The button looks nothing like a bootstrap button
## Expected result
The button needs to look like a bootstrap button when the bootstrap theme is applied
| 1.0 | Button - Bootstrap Theme - When theme is applied, button does not look like a bootstrap button - ## Description
When the bootstrap theme is applied, the button component does not look like a bootstrap button.
Here is what the bootstrap buttons look like depending on which button style (primary, secondary, success, etc) they use:

Here is what the igc-button looks like when the bootstrap theme is applied

## Steps to reproduce
1. Run story board
2. Apply bootstrap theme
3. Observe the button
## Result
The button looks nothing like a bootstrap button
## Expected result
The button needs to look like a bootstrap button when the bootstrap theme is applied
| non_priority | button bootstrap theme when theme is applied button does not look like a bootstrap button description when the bootstrap theme is applied the button component does not look like a bootstrap button here is what the bootstrap buttons look like depending on which button style primary secondary success etc they use here is what the igc button looks like when the bootstrap theme is applied steps to reproduce run story board apply bootstrap theme observe the button result the button looks nothing like a bootstrap button expected result the button needs to look like a bootstrap button when the bootstrap theme is applied | 0 |
23,469 | 21,950,970,845 | IssuesEvent | 2022-05-24 07:54:03 | maykinmedia/sdg-invoervoorziening | https://api.github.com/repos/maykinmedia/sdg-invoervoorziening | closed | Add update catalogus tests | enhancement inschatten epic:Usability | add the following tests:
- test_create_catalog_from_reference_if_enabled
- test_no_create_catalog_from_reference_if_disabled
- test_create_products_from_reference_product
- test_no_create_products_from_reference_without_active_version
- test_correct_products_if_no_initial_version
- test_correct_products_if_no_translations
- test_update_products_with_latest_reference_texts | True | Add update catalogus tests - add the following tests:
- test_create_catalog_from_reference_if_enabled
- test_no_create_catalog_from_reference_if_disabled
- test_create_products_from_reference_product
- test_no_create_products_from_reference_without_active_version
- test_correct_products_if_no_initial_version
- test_correct_products_if_no_translations
- test_update_products_with_latest_reference_texts | non_priority | add update catalogus tests add the following tests test create catalog from reference if enabled test no create catalog from reference if disabled test create products from reference product test no create products from reference without active version test correct products if no initial version test correct products if no translations test update products with latest reference texts | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.